At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for managing the design and configuration of an
integrated circuit semiconductor design
A system and methods that facilitate the design process and minimize the time and effort required to complete the design and fabrication of an integrated...
Secure data strategy for vehicle control systems
A method of providing secure data from vehicle operational variable data that includes a plurality of data message bits includes the steps of dividing the...
Method for securing data and device for implementing the same
A method and system to ensure the integrity of data in a data-processing device, a data packet is read from a memory and checked to determine whether the data...
Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
System, method and apparatus for electronic ticketing
The present invention provides a system, method and apparatus for securely granting access to an event. For example, in one embodiment of the present invention,...
Secure direct platter access
Bulk data transfers by directly accessing a persistent and secured area on the data storage device, e.g., a disk drive having a magnetic storage medium, without...
Parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
Systems and methods of providing security and reliability to proxy caches
The present solution provides a variety of techniques for accelerating and optimizing network traffic, such as HTTP based network traffic. The solution...
Method of non-intrusive analysis of secure and non-secure web application
traffic in real-time
Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be...
Hosted system for enabling enterprises to build and operate online
A system that enables enterprises to design, create integrate and operate online communities. The system operates as an on-demand hosted platform ...
Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
Method for verifying rights contained in a security module
A method of verification of rights is disclosed, contained in a security module associated to an apparatus processing broadcasted digital data. The apparatus is...
Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, especially to...
Method and system for dynamically terminating wireless and wireline calls
A third party tandem provider that intercepts and routes voice and data traffic between telecommunications carriers, e.g., wireless carriers, local exchange...
High-speed WAN to wireless LAN gateway
A gateway interconnecting a high speed Wide Area Network (WAN) and a lower speed Wireless Local Area Network (WLAN) is provided. The high speed WAN is...
Method for controlling a pre-charge process and a respective integrated
A method of controlling a pre-charge process of a data line (21, 22) in an integrated circuit (100) comprises the step of monitoring a rate of change of a...
System and method for disabling access to non-volatile storage in a
A multi-function peripheral (MFP) device having enhanced security for processed data is disclosed. The MFP includes both a non-volatile memory and a volatile...
Passive tag including volatile memory
A passive tag including a volatile memory is provided. The passive tag includes: a sensing unit which senses or measures information about environmental...
Methods, systems and devices for detecting threatening objects and for
classifying magnetic data
A method for detecting threatening objects in a security screening system. The method includes a step of classifying unique features of magnetic data as...
Controller providing shared device access for access control systems
An access control system and method for controlling access to secured areas includes a plurality of local readers connected to corresponding local control...
Method for LED-module assembly
A method for LED-module assembly comprising the steps of providing a base portion with a base inner surface and a cover with a cover inner surface which...
Data support with an optically variable structure
The invention relates to a security element with an optically variable structure, which has an embossed structure and a coating, wherein the embossed structure...
Method of unblocking a locked application using a personal identification
The invention relates to a method of securing applications on a chip card which is disposed in a digital appliance. A count is made of the number of times a...
Apparatus and method for verifying components of an ATM
An automated banking machine is provided which may comprise a trusted platform (TP) including a trusted platform module (TPM) in a computer of the machine....
Declarative data security for a rapid application development tool
A security privilege view object instance. The security privilege view object instance provides security at the view object instance level, permitting multiple...
Security method for data protection
An integrated circuit (IC) security apparatus with complementary security traces and a method for producing such an apparatus is disclosed. The security...
Method for access control to conditional access data
A method is disclosed for access control to conditional access data in a multimedia unit comprising at least one security module. This process includes:...
High security, multi-level processor and method of operating a computing
A computing system can be optimized for high security, reliability and/or integrity. The computing system can include a multiple instruction stream, single data...
Method for issuing IC card storing encryption key information
It is possible to issue an IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured....
System and method for trusted communication
A method of establishing a trusted path of data and a method of verifying the integrity of data presented for signing to a user of the personalized device in a...
Dynamic help user interface control with secured customization
A method and system is disclosed for generating a help interface to present static help content and customized help content for an application. Help content...
Method, system and computer program for configuring firewalls
A solution is proposed for distributing a software product to a set of data processing entities (such as endpoints) in a data processing system; the system...
Network monitoring method and system
A method of monitoring a network, in particular a data or telecommunication network, where the network includes a number of units to be monitored, and where...
Secure virtual private network utilizing a diagnostics policy and
diagnostics engine to establish a secure...
A secure virtual private network (VPN) is described herein. The secure VPN implements standard VPN software with diagnostics to ensure a client device coupling...
Method and system for securing content in media systems
A method and system for securing transfer, storage, and playback of media content. The method and system relate to securing transfer, storage, and playback of...
Extended data collection for multi-merchant purchasing environment for
A multi-merchant purchasing system is configured to identify downloadable products selected by a user for purchase. The identified downloadable products are...
Quantifying the output of credit research systems
A method of quantifying the value added by an internal company credit rating system is described. The method includes determining an internal company credit...
Securely providing advertising subsidized computer usage
A method and apparatus for assuring delivery of paid advertising to a user may involve asking a question about an advertisement or requiring data about the...
Customer identification and authentication procedure for online internet
payments using mobile phone
This invention shows a mobile terminal device (3) having a memory unit (3a) and an interface device (3b) which is releasably connectable to a multiple partner...
Communication apparatus and communication system
Remote control data is securely transmitted to a device under control. A remote control device transmits an acknowledge request for A ch to the device under...
Secure communication system and method using shared random source for key
Apparatus for use by a first party for key management for secure communication with a second party, said key management being to provide at each party,...
Method, system and securing means for data archiving with automatic
encryption and decryption by fragmentation...
In the method for data archiving with automatic en- and decryption data (9, 10) are exchanged between a client station (1) and an archive station (4). A...
Device, system and method for cryptographic key exchange
A method is disclosed whereby two parties can establish a cryptographic key for secure communications without any prior distribution of secret keys or other...
Image management system, image output apparatus, and computer readable
medium for security enhancement
Disclosed herein is an image management system, including: an image output apparatus which outputs an image data to various types of media, and a server,...
System for monitoring the tire
This invention provides a tire monitoring system, comprising a remote tire monitoring unit installed in the tire, a central controller, a speech indicating unit...
Cable protection system
A cable protection system protects a cable, such as an insulated conductor, data line, fluid or gas conduit, power cord, communication line or the like. The...
Transaction recordal system
A system for recording a transaction relating to a security document, the security document having disposed thereon or therein coded data including a number of...
Password protected modular computer method and device
A method and device for securing a removable Attached Computer Module ("ACM") 10. ACM 10 inserts into a Computer Module Bay ("CMB") 40 within a peripheral...
Method for enabling a trusted dialog for collection of sensitive data
The present invention is a method for enabling a trusted dialog for collection of sensitive data, including the steps of: storing a personal security token...
Systems and methods of associating security vulnerabilities and assets
Systems and methods of associating security vulnerabilities and assets, and related Graphical User Interfaces (GUIs) and data structures, are disclosed. A...