At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Information distribution device, method and storage medium storing
program, and data signal for information...
An information distribution device including a storage section, a reception section, a selection section and a distribution section. The storage section stores,...
Data security system and method with editor
The method, program and system secures sensitive data/objects found in a data source document with an editor. The simple editor identifies and displays, in...
Secure gateway with firewall and intrusion detection capabilities
A system, method and computer program product are provided. Initially, data is received from a remote source which is destined for a target. A portion of such...
Unit using OS and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitory (CRUM) unit used in an image forming job includes a central processing unit (CPU) to perform...
Resource based non-interactive entity application proxy method and system
A security method and system. The method includes retrieving configuration data associated with a non interactive entity (NIE) software application. The...
Network systems and methods for providing guest access
The present disclosure generally pertains to routers for providing guest access to networks. An integrated router in one exemplary embodiment comprises at least...
Defining, distributing and presenting device experiences
Platforms and techniques for defining, authorizing/authenticating, distributing, and presenting dynamic device experiences using a number of ...
Method for configuring a device using simple pictograms
A method for a user to easily securely configure a device is provided. The method includes displaying a user interface including a plurality of symbols...
Method to secure data exchange between a multimedia processing unit and a
A method for protecting multimedia data exchanged between a multimedia processing device and a security module managed by a management center, the multimedia...
System and method for data access and control
The present invention provides techniques for granting access to secured data. An access candidate may access some or all of the secured data by gaining access...
Method and system for providing a customized network
The present invention comprises a method, system, and computer-readable medium for providing a secure computer network for the real time transfer of data. The...
System and method for surely but conveniently causing reset of a
Enhanced reset logic is included in a user's computerized device so that the device owner (e.g., the user's employer) can assure prompt reset (e.g., to insure...
Memory management apparatus and method for same
A memory management apparatus uses a link list memory to manage a use area and a vacant area of a data memory. The use of the use area of the data memory by...
Method and system for user alteration of the configuration of a data
Disclosed are methods usable by non-experts for altering a configuration of a data warehouse. The initial configuration of the data warehouse is represented in...
Internet payment, authentication and loading system using virtual smart
A system loads, authenticates and uses a virtual smart card for payment of goods and/or services purchased on-line over the Internet. An online purchase and...
Call for quote/price system and methods for use in a wholesale financial
An electronic trading system and associated methods that provide for anonymous pricing data while ensuring the integrity of the system by preventing it from...
Method and apparatus for automated trading of equity securities using a
real time data analysis
A system and method for buying and selling securities based on volatility and liquidity rather than other fundamentals is demonstrated. The method involves:...
System and method for administering fixed index annuities
A system for administering an insurance account includes a processor; a memory in communication with the processor; the processor being adapted to: access data...
Key management messages for secure broadcast
The present invention involves establishing a top-level key and optionally also a verification tag. The top-level key is used as the MDP key for encrypting a...
System and method for enterprise security including symmetric key
A system and method for enterprise security including symmetric key protection. In accordance with an embodiment, the system provides a higher level of...
Generating and securing archive keys
Described herein is a method and apparatus for managing archives. The archive management process receives a passphrase and an indicator of an archive to be...
Enhancing messaging services using translation gateways
In one embodiment, a translation gateway is for use between a network of a messaging service provider and a hostile data network. The gateway is to forward...
System and method for enabling VPN-less session setup for connecting
mobile data devices to an enterprise data...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
RFID tag assembly and method of managing a race
A race management system which includes an RFID tag located between an inner and outer layer and is removably secured to a participant's bib through a mounting...
Human guard enhancing multiple site security system
Provided is a human guard enhancing multiple site security system comprising one or more human guards, peripheral equipment positioned at one or more sites,...
Methods and apparatuses to secure data transmission in RFID systems
Methods and apparatuses to secure data transmission in a radio frequency identification (RFID) system against eavesdropping, using multiple communication...
Secure use of externally stored data
A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response...
Device and method for smart card assisted digital content purchase and
The present invention discloses a device and a method useful for the provision of secure payment and certification of digital content access, while the devise...
Secure personal content server
A local content server system (LCS) for creating a secure environment for digital content is disclosed, which system comprises: a communications port in...
Keyboard security status check module and method
A keyboard security status check module and method are provided. The module is provided to enable a user to easily check the operating status of a keyboard...
Method of securely controlling through one or more separate private
networks an internet-connected computer...
A method of securely controlling through a private network a computer protected by a hardware-based inner access barrier or firewall and configured to operate...
Two-way authentication using a combined code
An authentication process for a client and a target service to perform mutual authentication. A combined code is received that comprises a combined code hash of...
Universal authentication token
A universal authentication token is configured to securely acquire security credentials from other authentication tokens and/or devices. In this manner, a...
Method and apparatus for securing unlock password generation and
A process may be utilized for securing unlock password generation and distribution. A first set of exclusive responsibilities, assigned to a trusted authority,...
Transferring data values via a data bus or storing data values using a
Data values being stored and transferred within a data processing system 8 have a selectable representation, such as true and complement, as indicated by an...
Secure memory controlled access
Secure memory controlled access is described. In embodiment(s), memory stores encrypted data and the memory includes a secure memory partition to store...
Receiver non-repudiation via a secure device
Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a...
Systems, devices, and methods for securely transmitting a security
parameter to a computing device
Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at...
Method for checking the integrity of data, system and mobile terminal
The invention relates to a method for checking the integrity of a message transmitted between a sender in a transmitting end and a recipient in a receiving end,...
Write protection method and device for at least one random access memory
In a write protection method for at least one random access memory device, the inherent problems of such memory devices with regard to data integrity and...
Intelligent solid-state non-volatile memory device (NVMD) system with
multi-level caching of multiple channels
A flash memory system stores blocks of data in Non-Volatile Memory Devices (NVMD) that are addressed by a logical block address (LBA). The LBA is remapped for...
Workflow manager for a distributed system
A workflow manager handles the communication between a workflow-enabled provider and a workflow-enabled client. The workflow manager maintains a directory of...
System and method for providing remote forensics capability
A system and method for performing a forensic analysis of a subject computer having a non-volatile memory with a second computer is provided. In one embodiment,...
System for enhancing the transmission security of the e-mails in the
System for enhancing the security of the e-mails transmitted from a sender (10) to a receiver (12) over a data transmission network such as Internet wherein a...
Storage system and method for operating storage system
By considering a device life and time needed for data migration, data stored in a storage apparatus is securely preserved until a retention term of each of the...
Modeling party identities in computer storage systems
The present invention extends to methods, systems, and computer program products for modeling party identities in computer storage systems. A federated identity...
System and method for reference number expansion
Method and system are disclosed for expanding a reference number range without altering existing data storage length. Such reference numbers may include...
Network access control
According to one embodiment of the present invention, there is provided a method of authorizing a communication device to connect to a network. The method...
Method and apparatus for remote vehicle communications and control
Long-range remote communication and control of a vehicle is achieved with primary and secondary cellular devices provided by the vehicle user. The primary...
Device, system, and method of establishing secure wireless communication
Device, system, and method of establishing secure wireless communication. A system includes at least one wireless communication device having a sensor to...