At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for computer implemented collateral management
A computer-implemented method for managing collateral risk associated with financial instrument trading and a data processing system includes a processor and...
Secure user plane location (SUPL) roaming
A geographic cell identification (cell ID) database is updated on the fly as, for example, roaming user equipment (UE) reports its location during Assisted...
Wireless device monitoring system including unauthorized apparatus and
authentication apparatus with security...
In a wireless device monitoring system including a mobile telephone and an authentication apparatus, a controller of the authentication apparatus repeatedly...
Wireless ad hoc network security
Providing network security includes detecting network traffic associated with an ad hoc network that includes a first station and a second station, and...
Duration computing method in a security module
Example embodiments are directed to a duration computing method in a security module inserted into an apparatus including an internal clock. The apparatus may...
Method and system for securing data utilizing redundant secure key storage
A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations,...
Broadcast receiver and method of processing data
A broadcast receiver, and a method of processing data are disclosed. The broadcast receiver includes a receiving unit, a RS frame decoder, a decoding unit, and...
IP communication apparatus and IP communication method of such apparatus
An IP terminal apparatus has a SIP controller, a UDP packet controller, and an RTP controller. The SIP controller transmits and receives a call control message...
Mobile device handoff while maintaining connectivity with multiple access
A method, system, and computer-readable media are provided for allowing a mobile device to maintain communication connectivity during a handoff between wireless...
Method for transforming and transporting printer data over the internet in
a secure and reliable manner
A method, apparatus, and computer-readable medium are provided. The method, for example, can--in certain embodiments--include transforming printer data into an...
Communication control method, computer system, conference management
server, communication method and portable...
A computer system has a presence server having a presence management unit that carries out a processing associated with presence data; and a conference...
Liquid crystal display device
A liquid crystal display device capable of controlling a viewing angle is disclosed. The liquid crystal display device includes: a liquid crystal panel...
High-volume manufacturing massive e-beam maskless lithography system
The present disclosure provides a maskless lithography apparatus. The apparatus includes a plurality of writing chambers, each including: a wafer stage operable...
Device for measuring a current flowing in a cable
An exemplary embodiment relates to a measuring device for measuring a current flowing in a first cable. The measuring device includes a measuring shunt in the...
Apparatus and method for providing in situ cooling of computer data
centers during service calls
An apparatus and method for cooling electronic components housed in a computer rack while performing maintenance operations is provided. The apparatus, in one...
Cassette-based power meter
A cassette-based power measuring apparatus includes a power sensing arrangement mounted within a cavity defined by a hollow bicycle cassette. The power sensing...
Digital signal transmission method digital signal transmission system,
digital signal transmitting apparatus...
An object of the invention is to arrange so that the digital signal transmission between specific equipments connected with each other by the transmission line...
Measuring coverage of application inputs for advanced web application
A computer implemented method, a data processing system, and a computer usable recordable-type medium having a computer usable program code monitor a black box...
Method and system for managing computer security information
A security management system includes a fusion engine which "fuses" or assembles information from multiple data sources and analyzes this information in order...
Method and apparatus for detecting executable software in an alternate
A method and apparatus of detecting executable software in alternate data streams to secure operation of a computer comprises processing information regarding a...
Method and system for providing remote access to resources in a secure
data center over a network
Methods, computer products, and systems are described for providing remote access to resources in a secure data center protected by at least one firewall. One...
System and method for sequentially processing a biometric sample
This invention provides for progressive processing of biometric samples to facilitate verification of an authorized user. The initial processing is performed by...
High granularity reactive measures for selective pruning of information
Some embodiments of high granularity reactive measures for selective pruning of information have been presented. The system and apparatus embody algorithms to...
Data control unit
A data control unit includes a primary power supply line to which a primary power supply voltage is supplied; a secondary power source line to which a secondary...
Automatic security action invocation for mobile communications device
A mobile communications device, server, and method for providing security on a mobile communications device are described. In accordance with one example...
Secure storage and replay of media programs using a hard-paired receiver
and storage device
A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. The method comprises the steps of receiving a data stream...
Data processing apparatus
A data processing apparatus is provided, which detects falsification of software to data and rewriting of the data. The data processing apparatus according to...
Scheme for authentication and dynamic key exchange
A scheme for authentication, dynamic key generation and exchange provides means for authentication of mobile nodes and networks, and for generation of per...
Integrated circuit and method of securing access to an on-chip memory
An integrated circuit having an on-chip access right manager to grant or deny access to a memory segment to a peripheral device such as a CPU (Central...
Multistage online transaction system, server, multistage online
transaction processing method and program
Provided is a system in which a plurality of nodes including a plurality of servers are connected at least with one NAS shared among the plurality of nodes. At...
On-demand database service system, method and computer program product for
conditionally allowing an...
In accordance with embodiments, there are provided mechanisms and methods for conditionally allowing an application of an entity access to data of another...
Terminal device and security device which automatically receive electronic
gift, information providing method...
It is possible to provide a privilege for data communication without requiring a troublesome user operation and to realize an information provision system for...
Randomized RSA-based cryptographic exponentiation resistant to side
channel and fault attacks
Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates data encryption, data...
Simultaneous voice and data systems for secure catalog orders
Systems and methods for providing a simultaneous voice and data user interface for secure catalog orders and in particular for providing a system and method for...
Method and apparatus to establish routes based on the trust scores of
routers within an IP routing domain
A router includes a management module and a routing module. The routing module can be used to route data around a network. The management module can be used to...
Device and method of managing data communications of a device in a network
via a split tunnel mode connection
A device and a method for managing data communications of a device in a network are provided. The method includes establishing a secure communication connection...
Information processing apparatus, control method, and computer-readable
medium for distributed processing of...
A print job often includes secret information, and information may suffer sniffing from devices that execute distributed processing of jobs, or on the network....
Printing apparatus and its control method, job processing method, and
When authentication data input before execution of print processing based on a secure print job is authenticated, a copy is printed based on the secure print...
RFID security system and method, including security stamp
Embodiments of an RFID security system and method are described herein. Embodiments include an RFID security server or appliance and RFID security software. In...
Panel system and method with embedded electronics
A system and method for a panel system containing embedded electronic elements providing both housing for the electronics and structural support. A preferred...
Method, transponder, and system for secure data exchange
A method for data exchange is provided, whereby a first code is generated by a transponder, which is transmitted to a base station, a first transmission...
Communication enabled active lock system
An active lock system includes wireless communication capability and information display and processing functions providing convenience, security and privacy...
Securing premises using surfaced-based computing technology
An approach is provided that that uses an electronic multi-touch floor covering that has numerous sensors to identify shapes. The electronic multi-touch floor...
Securing a data transmission channel
A method of establishing a secure communication channel between end nodes of an IP communication network via one or more intermediate nodes using the Secure...
Intelligent network interface controller
A network interface device includes a security database and a security services engine. The security database is configured to store patterns corresponding to...
Method and system for securely scanning network traffic
A method and system for implementing secure network communications between a first device and a second device, at least one of the devices communicating with...
Reusable authentication experience tool
A reusable authentication component may be integrated into a web page to communicate with an authentication server and authenticate a user to the web page. The...
Secure audit log access for federation compliance
A computer implemented method, data processing system, and computer program product for allowing limited access to a federation partner's audit logs in a...
Storage availability using cryptographic splitting
A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. In one aspect, a method includes assigning...
System and method providing region-granular, hardware-controlled memory
A memory, system, and method for providing security for data stored within a memory and arranged within a plurality of memory regions. The method includes...