At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for providing variable security level in a wireless
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...
Method and system for secure position determination
A system and method of security for navigation, positioning, and localization systems, and applications of cryptography thereto are provided. The security can...
Information equipment, method for supporting operation thereof, and
computer-readable storage medium for...
Information equipment having a memory area for which access restrictions are set is provided. The information equipment makes a determination, in response to...
Method for loading and managing an application on mobile equipment
A method for loading and managing a software application in a mobile equipment intended to receive digital data of mobile television services broadcasted via a...
Systems and methods for processing data flows
A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and...
Online management service for identification documents which prompts a
user for a category of an official document
An online identification document management service includes a host server having a web-based interface adapted to facilitate secure customer access to the...
Secure data protection during disasters
In situations, such as disasters, where the physical protection of data may be compromised, algorithmic protection of such data can be increased in anticipation...
Systems and methods for managing cryptographic keys
A common interface for managing cryptographic keys is provided. A request to manage a cryptographic key may be received in a first interface format, translated...
Method and mechanism for port redirects in a network switch
A method for selectively redirecting a data packet to a port on a switching device which is associated with a corresponding network service. In one embodiment,...
Self-contained sensor package for water security and safety
Disclosed is a floating sensor system having a casing that encloses a microcontroller. The microcontroller includes a digital processor and a non-volatile...
System and method for securely transmitting data using video validation
A system and method is disclosed for secure transmission of electronic information between two parties. A first data communication session between a first...
System and method for providing secured access to mobile devices
A system and method for providing secured access of a mobile device is disclosed herein. Access to data included in the mobile device is permitted when the...
Management method for archive system security
Creating a plaintext index from a text that is extracted from a file presents the risk of a leak of confidential information from the created index. To address...
Method and system for loading a secure firmware update on an adapter
device of a computer system
One embodiment of the present invention sets forth a method for loading a secure firmware update onto an adapter device in a computer system. The method...
Multiple independent levels of security containing multi-level security
Methods and systems for enabling security in transferring data from a single level MILS partition to the multiple level LAN. When a frame is received from an...
Processing feature revocation and reinvocation
A method includes storing, at a storage location of a system, a first security value and utilizing, at the system, a first security certificate compatible with...
Secure boot device
An electronic device includes a power supply unit, a control unit, a first boot circuit, and a data encryption unit. The control unit outputs a boot signal for...
Method and arrangement for securing user-definable data of a franking
In a method for data backup of a franking machine in which, in a data backup step, a connection is established between the franking machine and a remote data...
Control data modification within a cache memory
A data processing system is provided with at least one processor 4, 6, a main memory 18 and a cache memory 14. Cache data within the cache memory 14 has...
Access of elements for a secure web page through a non-secure channel
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a...
Search engine service utilizing hash algorithms
A secure search method of securing searches by a user through a hash provider using a search engine. The user registers with the hash provider. The hash...
System and method for synchronizing data records between multiple
A system and method for synchronizing data records between multiple databases is provided. Each database includes data records that are modified to include at...
Reprogrammable security for controlling piracy and enabling interactive
content using revocation status
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic...
Real-time stability indexing for intelligent energy monitoring and
management of electrical power network system
A system and method for intelligent monitoring and management of an electrical system is disclosed. The system includes a data acquisition component, a power...
Lightweight cordless security camera
The present invention is a lightweight, cordless security camera comprising a lightweight stand or tripod, a video camera with pan, tilt, and zoom articulation...
System and method for securing data
In accordance with the teachings described herein, systems and methods are provided for securing data for transmission to a wireless device. The disclosed...
Efficient and low power encrypting and decrypting of data
The present invention relates to the field of computer data encrypting and decrypting, especially for mobile equipments like PDA, mobile phones, smart cards and...
Random number generation through use of memory cell activity
Systems and/or methods that facilitate security of data are presented. A random number generation component generates random numbers based in part on electron...
Methods and apparatus for authenticating data as originating from a
storage and processing device and for...
Techniques are described for using unique features of a storage medium for authentication of data as originating from the storage medium, and also for...
Security protection for data communication
Authentication of an electronic communication apparatus capable of communicating data messages with a server according to a synchronization protocol includes...
Semiconductor memory device having data clock training circuit
A data clock frequency divider circuit includes a training decoder and a frequency divider. The training decoder outputs a clock alignment training signal,...
Enhanced gateway for routing between networks
A network gateway is disclosed, wherein for a received communication, the gateway determines a network component to which information for the communication is...
Multi-tier wireless home mesh network with a secure network discovery
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
Method and architecture for a scalable application and security switch
using multi-level load balancing
A switch architecture and method provides scaling through multi-level load balancing of flows across data and application processing planes. An input/output...
Securely erasing flash-based memory
A method is used in securely erasing flash-based memory. A new version of data is received for a logical location of a flash-based memory. An old version of the...
Detachable hard drive with an electromagnetic switch
A detachable hard drive with an electromagnetic switch comprises a tray, a fastening unit and an electromagnetic switch. The electromagnetic switch is powered...
Space scanner for self-control moving object
Provided is a space scanner for a self-control moving object. The space scanner has a structure in which a reflective mirror is rotated and tilted. Thus, the...
Embedding authentication data to create a secure identity document using
combined identity-linked images
Techniques for creating an identity document are provided. The techniques include obtaining two or more identity-linked images, deriving one or more at least...
Emulated radio frequency identification
A mobile communication device is equipped with hardware and/or software components to enable the device to output a data in a form of a radio frequency signal,...
Structured cabling system and method
A structured cabling system includes a plurality of data cables (6A-6F), one end of each cable being secured to a jack of a multiple jack assembly (1) and the...
Method and apparatus for detecting leakage of sensitive information
A method and apparatus for preventing leakage of sensitive information from a computer is described. The method includes identifying data entered into the...
Network security system and method
In a security system for network communications with client devices, each client device has a communication module for communicating with at least one server...
Rapid archivable WORM memory system based on a hard disc
A process is described which permits particularly rapid writing and reading of small files, such as e-mails and scanned documents, for legally relevant WORM...
Method for using information in another domain, program for using
information in another domain, and...
To use data in another domain while executing a script language based on a security limit of an HTTP client. A main program provided to an HTTP client from a...
In one embodiment, a method is provided that may include encrypting, based least in part upon at least one key, one or more respective portions of input data to...
Method and apparatus for securing data storage while insuring control by
A storage device with hardened security features has a storage medium, an interface, and a controller. The interface is adapted to communicatively couple the...
Computer architecture for an electronic device providing a secure file
A secure file service includes a cryptographic processor (302, 602) and a secure file system (301, 601). The cryptographic processor is comprised of a trusted...
System and method for efficient security domain translation and data
A mobile UE includes a CPU, a secure DMA module, a secure cryptographic module, secure memory, and non-secure memory. The secure cryptographic module and secure...
Method and system for securing data utilizing reconfigurable logic
A method is provided for securing data sets by dynamically hopping amongst a variety of data encryption and/or manipulation protocols. Such dynamic protocol...
Data migration and copying in a storage system with dynamically expansible
When migrating data stored in a storage region assigned to a volume to another storage region, the connection status of the host computer and volume is...