At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for memory protection and security using credentials
A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections,...
System and method for requesting and issuing an authorization document
A device and method for supporting the issuing of an authorization document (6) to an applicant; the said device comprising: a computer (10(i)) comprising a...
JMS provider with plug-able business logic
The invention provides plug-in framework, enabling embedding of content-based processes to in a messaging paradigm provider service. In the preferred...
Certified electronic messaging
A system whereby a first user can post messages securely to a central data server, which date stamps the messages and permanently records their content and...
Method and apparatus for trading assets
Method and apparatus for trading financial assets, such as foreign exchange and money market instruments, commodities and securities. The invention, which may...
Distributed access control and authentication
Presented are apparatus and method for distributed authentication and control of an electronic security device. The method includes prompting an authority for...
Wireless portable device for sharing digital content items
A portable wireless communications subscriber audio and/or video player apparatus and system and method for selecting, requesting, downloading, and playing...
Methods and apparatus for use in switching user account data and
operations between two different mobile...
Methods and apparatus for use in switching communications associated with a user account from a first ("source") mobile communication device to a second...
Recoverable biometric identity system and method
A method for identifying persons based on biometric data achieves enhanced security and increased accuracy compared with other systems by distorting one or more...
Tape failover across a cluster
A security appliance that encrypts and decrypts information is installed in each of redundant multi-paths between a host system and a back up tape storage...
System and method for encrypted group network communication with
Various embodiments of the disclosed subject matter provide methods and systems for improved efficiency and security in secure gateway-to-secure gateway network...
Monitoring usage of encrypted broadcast services
Embodiments include a method and system for monitoring usage of an encrypted broadcast service, such as an encrypted television program, in a secure client...
Utilizing data reduction in steganographic and cryptographic system
The present invention relates to methods for protecting a data signal using the following techniques: applying a data reduction technique to reduce the data...
Stateless hardware security module
Stateless hardware security modules facilitate securing data transfers between devices in a data communication system. The stateless hardware security module...
System, apparatus, and method for the secure storing of bulk data using
one-time pad encryption
A present novel and non-trivial decryption system and methods are disclosed for the secure storing of bulk data using one-time pad ("OTP") encryption. A storage...
Pet restraint system
A pet restraint system includes a collar having first and second ends and a fastener to selectively secure the first and second collar ends about a pet. A radio...
Hardware-based protection of secure data
Computer-readable media, computerized methods, and computer systems for protecting secure data by writing content of the secure data to a protected memory...
Establishing secure data transmission using unsecured E-mail
In one embodiment, a host entity may create a trusted connection with a guest entity. The host entity may encrypt a trusted connection invitation for an...
Device independent authentication system and method
A system is disclosed which facilitates authentication processes with web-enabled wireless devices, including those that do not support the use of cookie files....
Identification and authentication system and method
An identification system 1 used for authenticating a user at a user station 30 requesting access to secure information at a base station 20, wherein the system...
System for object-oriented data management of securities trends
A system for processing electronic data which is transmitted from a host computer to a client computer is provided. The system converts the electronic data into...
Securing printed output
A notary processor can be dedicated to performing the security-based variable information printing. A method resolves the availability of resources required by...
Keyboard-input information-security apparatus and method
A keyboard-input information-security apparatus and method are provided. The apparatus includes an interrupt-descriptor table for storing a list of addresses of...
Method and system for memory attack protection to achieve a secure
A slave device may receive commands from a host device communicatively coupled to the slave device, via a secure interface configured between the slave device...
Pattern recognition method and apparatus for data protection
Provided a secure pattern recognition method. The method includes: receiving data and generating a probe by converting the received data into a template for...
System and method for securing system content by automated device
A system is provided for securely downloading content to a mobile telecommunications device. The system includes a mobile application to enable the mobile...
Systems and methods for authenticating communications in a network medium
Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key...
Peer-to-peer security authentication protocol
A salt transmitted by a second node is received at a first node. The received salt is used to decrypt encrypted data. Optionally, authorization to access a...
Critical security parameter generation and exchange system and method for
smart-card memory modules
A storage device contains a smart-card device and a memory device, which is connected to a controller. The storage device may be used in the same manner as a...
Storing a device management encryption key in a network interface
A device management system for securely storing an encryption key associated with a device management session. The device management system includes an...
Virtualization-based security apparatuses, methods, and systems
Apparatuses, devices, and methods for protecting content on a computer are disclosed that employ a novel hypervisor configured to segregate, or partition,...
Portable mass storage device with virtual machine activation
A portable mass storage device is used to store large files such as digital pictures, movies and music. The mass storage device has firmware with security...
Method and system for data security
A method, system and apparatus that advantageously provide a security protocol for data security. The apparatus includes a random number generator for...
Method and system for enhanced distribution of financial instruments
An issuer models financial instruments (e.g., proposed securities) with initial financial parameters to facilitate defining a financial instrument with final...
Fair-value pricing of a financial asset
An exemplary embodiment comprises a method for determining at an effective valuation time a fair value of an exchange traded fund comprising securities, at...
Charge managing system, image forming apparatus, charge managing server,
and image forming method
A charge managing system including an image forming apparatus and a charge managing server is provided. The image forming apparatus includes plural applications...
Systems and methods for distributing and securing data
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A...
Systems and methods for securing video card output
The various methods and systems described herein are directed to supplying a secure channel for software executing on a host computer. The methods and systems...
Secure combined interoperable multiplexing
Systems and methods for combining a plurality of transport streams into a single transport stream for transmission to, e.g., a single frequency network via a...
Detection of physical movement for document sharing
A system for using accelerometer-based detection of physical movement for document sharing provides easy and intuitive ways to securely share documents, even...
Wireless communication system, mobile station and handover control method
A processing capability for data communication with a packet terminal is secured while packet loss is prevented, and a load to a mobile station in a handover is...
Method and apparatus for data security and automatic repeat request
implementation in a wireless communication...
A method and apparatus for implementing data security and automatic repeat request (ARQ) in a wireless communication system are disclosed. Cipher entities are...
Portable multi-level security communications system
A portable multi-level security communications system (system) provides a communications backbone for Internet Protocol (IP) based data at multiple levels of...
Data storage device assembly
A data storage device assembly includes a rack, a mounting member, and a handle. The rack has a data storage device mounted therein. The mounting member is...
Method for characterizing integrated circuits for identification or
A method of detecting small changes to a complex integrated circuit measuring RF/microwave scattering parameters between every pin over a wide frequency range....
Secure commercial transactions system
A secure financial transactions system. The system generally includes a card that can be used a credit card, ATM card or debit card having a personal...
Method of authorising a transaction between a computer and a remote server
and communications system, with...
A transaction between a computer, a remote server and a communications system can be authorized securely. A portable card reader is connected to a computer....
Banking system controlled responsive to data bearing records and user
input of a phone received security code
A banking system operates to cause financial transfers responsive to card data read from data bearing records by a card reader. The system includes at least one...
RFID architecture in an industrial controller environment
An RFID reader and/or writer module in an industrial controller (e.g., PLC). The RFID module interfaces internally to the controller for tight integration...
Adjustment of period of real-time slow drift correction of alignment of
handset's local oscillator for a...
A method and apparatus to perform a real-time drift correction of a remote handset's local oscillator in a digital cordless telephone. The remote handset begins...