At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Transfer server of a secure system for unattended remote file and message
A method for automatically transferring a data file from a network drive of a client controlled local area network to a transfer server over the Internet...
Secure handling of stored-value data objects
An approach to managing stored-value data objects, such as electronic tickets, comprises secure systems and procedures for ticket issuing, storage, and...
Method and system for secure management of co-located customer premises
A method, system, and apparatus for managing customer premise equipment according to one embodiment includes establishing a secure connection between a first...
Semiconductor device including encryption section, semiconductor device
including external interface, and...
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an...
Information processing apparatus and method thereof
It is simpler to manage an electronic signature on a It is simpler to manage an electronic signature on a server. On the contrary, authentication in a paper is...
Secure management of configuration parameters in a computing platform
A computing platform (10) protects system firmware (30) using a manufacturer certificate (36). The manufacturer certificate binds the system firmware (30) to...
System and procedure for rapid decompression and/or decryption of securely
A procedure and system reduces latency in restoring encrypted or compressed and encrypted data through a security appliance. The security appliance is coupled...
Portable information security device
The invention discloses a portable information security device in the security field. In order to solve the problem that the USB Key transfers data at low speed...
System, computer program product and method for managing and controlling a
local network of electronic devices...
A system method and computer program product for setting up a wireless electronic device to join a wireless local area network (LAN). The method upon which the...
Takeover processes in security network integrated with premise security
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a...
Pseudorandom number generator and encryption device using the same
A pseudorandom number generator reduced in size while maintaining high security is disclosed. The generator has a state storage unit of 2 blocks (n bits per...
System and method for modular electronic signature block
Method and system are directed to capturing consumer agreement to the terms of a transaction conducted online. The method/system uses a modular electronic...
Data collection method and report generation apparatus including an
automatch function for generating a report...
A system is disclosed for storing and maintaining a plurality of field orders and a corresponding plurality of invoices. This system allows a supplier and a...
Method and apparatus for security in a data processing system
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration...
Method, apparatus, and system for controlling playout of media
To manage playout of digital media by a media player, a wireless communication device (WCD) will include partitioned data storage including discrete partitions...
System and method for a derivation function for key per page
Disclosed herein are systems, methods and computer-readable media to perform data encryption and decryption using a derivation function to obtain a key per page...
Encrypting and decrypting a data stream
The present invention provides methods, systems and apparatus for encrypting and for decrypting a data stream, for securely sending a data stream and for...
Multi-parameter X-ray computed tomography
The present invention relates to the field of x-ray imaging. More particularly, embodiments of the invention relate to methods, systems, and apparatus for...
Security system for portable computer
A portable computer searches for preprogrammed wireless stations when it boots, and if it does not recognize any, stops booting the O.S. so that data cannot be...
Fixed mobile convergence (FMC) with PDIF and SIP gateway
Apparatus and methods are described for establishing a connection to a wireless subscriber network over a wireless LAN. A secure tunnel is established between a...
Vehicle identification, tracking and enforcement system
A system for monitoring and tracking vehicles in parking locations, public roadways and highway entrances and exits and other public vehicle access areas is...
A programmable smartcard device (10) carries a file system (22, 24) and operating software enabling the on-device file system to interface with at least one...
Secure information storage and delivery system and method
A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault...
Sub-volume level security for deduplicated data
A network storage server receives write requests from clients via a network and internally buffers data blocks written by the write requests. At a consistency...
System and method for secure data transmission
A system for secure data transmission comprises a processor, a memory coupled to the processor, and a string generator stored in the memory and executable by...
Method and system for secured real time protocol in scalable distributed
A method of providing secured teleconference in a distributed teleconference system including providing one or more servers interconnected in a distributed...
Near field communication, security and non-volatile memory integrated
sub-system for embedded portable applications
An architecture is presented that facilitates integrating memory, security functionalities and near field communication (NFC) capabilities in a mobile device. A...
Integrating security protection tools with computer device integrity and
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and...
Securing safety-critical variables
A system comprises a general-purpose memory, a lockable memory, a memory management unit, and a processor. The general-purpose memory includes data for a first...
Flash memory device having secure file deletion function and method for
securely deleting flash file
Disclosed is a flash memory device having a secure flash file deletion function and a method for securely deleting a flash file. Data and object headers as...
Method of receiving, storing, and providing device management parameters
and firmware updates to application...
A method for the efficient persistent storage of Device Management (DM) information on a mobile device is provided. More specifically, the present design...
Method, system, and computer program product for managing controlled
residential or non-residential environments
A control server, or similar central processor, manages the distribution of data (including audio and video), voice, and control signals among a plurality of...
Network server emergency information accessing method
A Means and Methods for providing a PSAP with means for tracking the real time location of a wireless telephone that connects to an Internet server upon...
Gaming console-specific user authentication
Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The...
Vehicle security and monitoring system
A vehicle monitoring system includes a communication subsystem configured to provide two-way wireless communication, and a controller mounted in a vehicle and...
Multi function bluetooth apparatus
A method and apparatus for secure access to data, to application and to systems and for providing an alarm to users upon detecting that a monitored device is...
Method for manufacturing semiconductor device
A method for manufacturing a semiconductor device comprises including a insulating pattern and a silicon film over a SOI substrate, thereby increasing a reduced...
User-centric authentication system and method
A system for authenticating a user in a network. The authentication system includes a computer resource having secure data, an authentication computing system...
Interactive image-based document for secured data access
The present invention is directed to a method and system for verifying a user for copying or printing a limited portion of digital content while allowing the...
Server apparatus and installation information making method
A license server generates USB serial IDs for USB memory secured in a multi-function machine and then makes electronic signature files using the USB serial IDs...
Secure federation of data communications networks
Techniques for secure federation of data communications networks are provided. The techniques employ an edge proxy server to route messages depending on a...
Secure backup system and method in a mobile telecommunication network
The secure backup system is in a mobile telecommunication network and has at least one mobile station with data, a backup entity for storing a backup file of...
Security-enhanced storage devices using media location factor in
encryption of hidden and non-hidden partitions
Methods and devices for increasing or hardening the security of data stored in a storage device, such as a hard disk drive, are described. A storage device...
Security devices, systems and computer program products
A security device having a knowledge input module obtaining knowledge data and a user data storage module storing user-specific data. A processor performs at...
Password input device, computer security system using the same and method
A password input device includes a detection module, a recognition module, and an output module. The detection module is configured for detecting angular...
System for self-service recharging and method for the same
The present invention discloses a method for self-service recharging and a system for the same, relating to the security communications of online banking. The...
Method and system for certificate revocation list compression
Embodiments of the present invention provide a compression capability for compressing a CRL, such as an X.509 CRL, stored as a file, data structure or data...
Chaining port scheme for network security
A networking method, microchip, and device are described in which a first security engine may be associated with a chaining port and configured to perform an...
Data storage device with security feature
A data storage device is disclosed with at least two partitions and a set of switches to separately enable and disable read and write operations to each of the...
System and method for dynamic security provisioning of computing resources
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system...