At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for providing remote access to resources in a secure
data center over a network
Methods, computer products, and systems are described for providing remote access to resources in a secure data center protected by at least one firewall. One...
System and method for sequentially processing a biometric sample
This invention provides for progressive processing of biometric samples to facilitate verification of an authorized user. The initial processing is performed by...
High granularity reactive measures for selective pruning of information
Some embodiments of high granularity reactive measures for selective pruning of information have been presented. The system and apparatus embody algorithms to...
Data control unit
A data control unit includes a primary power supply line to which a primary power supply voltage is supplied; a secondary power source line to which a secondary...
Automatic security action invocation for mobile communications device
A mobile communications device, server, and method for providing security on a mobile communications device are described. In accordance with one example...
Secure storage and replay of media programs using a hard-paired receiver
and storage device
A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. The method comprises the steps of receiving a data stream...
Data processing apparatus
A data processing apparatus is provided, which detects falsification of software to data and rewriting of the data. The data processing apparatus according to...
Scheme for authentication and dynamic key exchange
A scheme for authentication, dynamic key generation and exchange provides means for authentication of mobile nodes and networks, and for generation of per...
Integrated circuit and method of securing access to an on-chip memory
An integrated circuit having an on-chip access right manager to grant or deny access to a memory segment to a peripheral device such as a CPU (Central...
Multistage online transaction system, server, multistage online
transaction processing method and program
Provided is a system in which a plurality of nodes including a plurality of servers are connected at least with one NAS shared among the plurality of nodes. At...
On-demand database service system, method and computer program product for
conditionally allowing an...
In accordance with embodiments, there are provided mechanisms and methods for conditionally allowing an application of an entity access to data of another...
Terminal device and security device which automatically receive electronic
gift, information providing method...
It is possible to provide a privilege for data communication without requiring a troublesome user operation and to realize an information provision system for...
Randomized RSA-based cryptographic exponentiation resistant to side
channel and fault attacks
Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates data encryption, data...
Simultaneous voice and data systems for secure catalog orders
Systems and methods for providing a simultaneous voice and data user interface for secure catalog orders and in particular for providing a system and method for...
Method and apparatus to establish routes based on the trust scores of
routers within an IP routing domain
A router includes a management module and a routing module. The routing module can be used to route data around a network. The management module can be used to...
Device and method of managing data communications of a device in a network
via a split tunnel mode connection
A device and a method for managing data communications of a device in a network are provided. The method includes establishing a secure communication connection...
Information processing apparatus, control method, and computer-readable
medium for distributed processing of...
A print job often includes secret information, and information may suffer sniffing from devices that execute distributed processing of jobs, or on the network....
Printing apparatus and its control method, job processing method, and
When authentication data input before execution of print processing based on a secure print job is authenticated, a copy is printed based on the secure print...
RFID security system and method, including security stamp
Embodiments of an RFID security system and method are described herein. Embodiments include an RFID security server or appliance and RFID security software. In...
Panel system and method with embedded electronics
A system and method for a panel system containing embedded electronic elements providing both housing for the electronics and structural support. A preferred...
Method, transponder, and system for secure data exchange
A method for data exchange is provided, whereby a first code is generated by a transponder, which is transmitted to a base station, a first transmission...
Communication enabled active lock system
An active lock system includes wireless communication capability and information display and processing functions providing convenience, security and privacy...
Securing premises using surfaced-based computing technology
An approach is provided that that uses an electronic multi-touch floor covering that has numerous sensors to identify shapes. The electronic multi-touch floor...
Securing a data transmission channel
A method of establishing a secure communication channel between end nodes of an IP communication network via one or more intermediate nodes using the Secure...
Intelligent network interface controller
A network interface device includes a security database and a security services engine. The security database is configured to store patterns corresponding to...
Method and system for securely scanning network traffic
A method and system for implementing secure network communications between a first device and a second device, at least one of the devices communicating with...
Reusable authentication experience tool
A reusable authentication component may be integrated into a web page to communicate with an authentication server and authenticate a user to the web page. The...
Secure audit log access for federation compliance
A computer implemented method, data processing system, and computer program product for allowing limited access to a federation partner's audit logs in a...
Storage availability using cryptographic splitting
A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. In one aspect, a method includes assigning...
System and method providing region-granular, hardware-controlled memory
A memory, system, and method for providing security for data stored within a memory and arranged within a plurality of memory regions. The method includes...
System and method for providing variable security level in a wireless
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of...
Method and system for secure position determination
A system and method of security for navigation, positioning, and localization systems, and applications of cryptography thereto are provided. The security can...
Information equipment, method for supporting operation thereof, and
computer-readable storage medium for...
Information equipment having a memory area for which access restrictions are set is provided. The information equipment makes a determination, in response to...
Method for loading and managing an application on mobile equipment
A method for loading and managing a software application in a mobile equipment intended to receive digital data of mobile television services broadcasted via a...
Systems and methods for processing data flows
A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and...
Online management service for identification documents which prompts a
user for a category of an official document
An online identification document management service includes a host server having a web-based interface adapted to facilitate secure customer access to the...
Secure data protection during disasters
In situations, such as disasters, where the physical protection of data may be compromised, algorithmic protection of such data can be increased in anticipation...
Systems and methods for managing cryptographic keys
A common interface for managing cryptographic keys is provided. A request to manage a cryptographic key may be received in a first interface format, translated...
Method and mechanism for port redirects in a network switch
A method for selectively redirecting a data packet to a port on a switching device which is associated with a corresponding network service. In one embodiment,...
Self-contained sensor package for water security and safety
Disclosed is a floating sensor system having a casing that encloses a microcontroller. The microcontroller includes a digital processor and a non-volatile...
System and method for securely transmitting data using video validation
A system and method is disclosed for secure transmission of electronic information between two parties. A first data communication session between a first...
System and method for providing secured access to mobile devices
A system and method for providing secured access of a mobile device is disclosed herein. Access to data included in the mobile device is permitted when the...
Management method for archive system security
Creating a plaintext index from a text that is extracted from a file presents the risk of a leak of confidential information from the created index. To address...
Method and system for loading a secure firmware update on an adapter
device of a computer system
One embodiment of the present invention sets forth a method for loading a secure firmware update onto an adapter device in a computer system. The method...
Multiple independent levels of security containing multi-level security
Methods and systems for enabling security in transferring data from a single level MILS partition to the multiple level LAN. When a frame is received from an...
Processing feature revocation and reinvocation
A method includes storing, at a storage location of a system, a first security value and utilizing, at the system, a first security certificate compatible with...
Secure boot device
An electronic device includes a power supply unit, a control unit, a first boot circuit, and a data encryption unit. The control unit outputs a boot signal for...
Method and arrangement for securing user-definable data of a franking
In a method for data backup of a franking machine in which, in a data backup step, a connection is established between the franking machine and a remote data...
Control data modification within a cache memory
A data processing system is provided with at least one processor 4, 6, a main memory 18 and a cache memory 14. Cache data within the cache memory 14 has...
Access of elements for a secure web page through a non-secure channel
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a...