At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods for segmenting and protecting a storage subsystem
A storage subsystem comprises a set of zone definitions that uses physical block addresses to divide a memory array in the storage subsystem into zones or...
Information processing apparatus, control method therefor, and storage
An information processing apparatus capable of collecting electronic data efficiently and avoiding sharing highly confidential and secure electronic data with...
Proactive information monitoring systems and methods
Systems and methods for proactive information monitoring are presented. A user can define alert criteria for generating an alert through a centralized alerting...
System and method for securely managing data stored on mobile devices,
such as enterprise mobility data
A system and method for managing data stored on mobile devices is described. In some cases, the system stores data, such as data under enterprise mobility...
Secure terminal data loader system and in-flight entertainment management
A terminal data loading device on a mobile platform includes a media unit for receiving a transportable media element containing media data and outputting a...
Variable data encryption of characters printed or displayed on screen,
which may be embedded in photos, images,...
It is a source of security digital characters, incomprehensible to the naked eye, which can only be identified when the transparent substrate (acrylic, plastic...
Liquid crystal display panel and liquid crystal display device
The present invention provides a liquid crystal display panel capable of providing a high contrast ratio with a storage capacitance being secured, and also...
Security device for confidential information
This security device for confidential information, mentioned in a document (D), includes an element (1, 4) forming a data storage medium and removable element...
Magnetic stripe card anti-fraud security system
To prevent fraud, a magnetic card's ID, which may be a stripe ID or security chip, is converted to an encrypted card ID, which is stored on the card and in a...
System including an electronic key for safety deposit box cover lock and
key managing dock
A system for use in banking operates responsive to data included in data bearing records. The system is suitable for securing the contents in safety deposit...
Dynamic configuration of a gaming system
A method to enable dynamic configuration of gaming terminals installed in one or a plurality of gaming premises whereby certified games, certified data files...
Method for analyzing and managing unstructured data
A system and method for managing unstructured data that includes identifying at least one unstructured data environment with unstructured data, identifying...
Methods and systems for managing a potential security threat to a network
Methods, systems and computer readable mediums storing computer executable programs for managing a potential security threat to a network are disclosed. Network...
Transfer server of a secure system for unattended remote file and message
A method for automatically transferring a data file from a network drive of a client controlled local area network to a transfer server over the Internet...
Secure handling of stored-value data objects
An approach to managing stored-value data objects, such as electronic tickets, comprises secure systems and procedures for ticket issuing, storage, and...
Method and system for secure management of co-located customer premises
A method, system, and apparatus for managing customer premise equipment according to one embodiment includes establishing a secure connection between a first...
Semiconductor device including encryption section, semiconductor device
including external interface, and...
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an...
Information processing apparatus and method thereof
It is simpler to manage an electronic signature on a It is simpler to manage an electronic signature on a server. On the contrary, authentication in a paper is...
Secure management of configuration parameters in a computing platform
A computing platform (10) protects system firmware (30) using a manufacturer certificate (36). The manufacturer certificate binds the system firmware (30) to...
System and procedure for rapid decompression and/or decryption of securely
A procedure and system reduces latency in restoring encrypted or compressed and encrypted data through a security appliance. The security appliance is coupled...
Portable information security device
The invention discloses a portable information security device in the security field. In order to solve the problem that the USB Key transfers data at low speed...
System, computer program product and method for managing and controlling a
local network of electronic devices...
A system method and computer program product for setting up a wireless electronic device to join a wireless local area network (LAN). The method upon which the...
Takeover processes in security network integrated with premise security
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a...
Pseudorandom number generator and encryption device using the same
A pseudorandom number generator reduced in size while maintaining high security is disclosed. The generator has a state storage unit of 2 blocks (n bits per...
System and method for modular electronic signature block
Method and system are directed to capturing consumer agreement to the terms of a transaction conducted online. The method/system uses a modular electronic...
Data collection method and report generation apparatus including an
automatch function for generating a report...
A system is disclosed for storing and maintaining a plurality of field orders and a corresponding plurality of invoices. This system allows a supplier and a...
Method and apparatus for security in a data processing system
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration...
Method, apparatus, and system for controlling playout of media
To manage playout of digital media by a media player, a wireless communication device (WCD) will include partitioned data storage including discrete partitions...
System and method for a derivation function for key per page
Disclosed herein are systems, methods and computer-readable media to perform data encryption and decryption using a derivation function to obtain a key per page...
Encrypting and decrypting a data stream
The present invention provides methods, systems and apparatus for encrypting and for decrypting a data stream, for securely sending a data stream and for...
Multi-parameter X-ray computed tomography
The present invention relates to the field of x-ray imaging. More particularly, embodiments of the invention relate to methods, systems, and apparatus for...
Security system for portable computer
A portable computer searches for preprogrammed wireless stations when it boots, and if it does not recognize any, stops booting the O.S. so that data cannot be...
Fixed mobile convergence (FMC) with PDIF and SIP gateway
Apparatus and methods are described for establishing a connection to a wireless subscriber network over a wireless LAN. A secure tunnel is established between a...
Vehicle identification, tracking and enforcement system
A system for monitoring and tracking vehicles in parking locations, public roadways and highway entrances and exits and other public vehicle access areas is...
A programmable smartcard device (10) carries a file system (22, 24) and operating software enabling the on-device file system to interface with at least one...
Secure information storage and delivery system and method
A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault...
Sub-volume level security for deduplicated data
A network storage server receives write requests from clients via a network and internally buffers data blocks written by the write requests. At a consistency...
System and method for secure data transmission
A system for secure data transmission comprises a processor, a memory coupled to the processor, and a string generator stored in the memory and executable by...
Method and system for secured real time protocol in scalable distributed
A method of providing secured teleconference in a distributed teleconference system including providing one or more servers interconnected in a distributed...
Near field communication, security and non-volatile memory integrated
sub-system for embedded portable applications
An architecture is presented that facilitates integrating memory, security functionalities and near field communication (NFC) capabilities in a mobile device. A...
Integrating security protection tools with computer device integrity and
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and...
Securing safety-critical variables
A system comprises a general-purpose memory, a lockable memory, a memory management unit, and a processor. The general-purpose memory includes data for a first...
Flash memory device having secure file deletion function and method for
securely deleting flash file
Disclosed is a flash memory device having a secure flash file deletion function and a method for securely deleting a flash file. Data and object headers as...
Method of receiving, storing, and providing device management parameters
and firmware updates to application...
A method for the efficient persistent storage of Device Management (DM) information on a mobile device is provided. More specifically, the present design...
Method, system, and computer program product for managing controlled
residential or non-residential environments
A control server, or similar central processor, manages the distribution of data (including audio and video), voice, and control signals among a plurality of...
Network server emergency information accessing method
A Means and Methods for providing a PSAP with means for tracking the real time location of a wireless telephone that connects to an Internet server upon...
Gaming console-specific user authentication
Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The...
Vehicle security and monitoring system
A vehicle monitoring system includes a communication subsystem configured to provide two-way wireless communication, and a controller mounted in a vehicle and...
Multi function bluetooth apparatus
A method and apparatus for secure access to data, to application and to systems and for providing an alarm to users upon detecting that a monitored device is...
Method for manufacturing semiconductor device
A method for manufacturing a semiconductor device comprises including a insulating pattern and a silicon film over a SOI substrate, thereby increasing a reduced...