At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Management of cryptographic keys for securing stored data
A management system generates a sequence of keys and an identifier of each key in the sequence. A current key in the sequence and the identifier of the current...
Systems and methods of combined bluetooth and WLAN signaling
Disclosed herein are systems and methods of combined Bluetooth and WLAN signaling. Such systems and methods may use a Bluetooth connection to signal WLAN...
Radio transmitting apparatus and radio transmitting method
A radio transmitting apparatus and a radio transmitting method wherein the increase of the guard time in a random access region is reduced to secure the data...
Ability to provide quality of service (QOS) to an IPSEC tunnel in a
Quality of Service (QoS) is provided to a secure data tunnel such an IPsec tunnel using information about the tunnel and the underlying data session to...
Protection for an integrated circuit chip containing confidential data
An integrated circuit chip for holding or processing data on information for secure protection. A first side of the chip has at least one first conductor...
Data carrier and data carrier system
A region to store authentication commands to perform authentication between a data carrier and a reader/writer device is divided into at least three areas, and...
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
Secure data center having redundant cooling and blast protection for
protecting computer servers by the...
This application relates to improvements to data centers, including protection from: (1) vandalism, (2) high winds, (3) earthquake, (4) storms, (5) water used...
Data security method and device for computer modules
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer...
System and method for attack and malware prevention
The present invention is a system and method for detecting and preventing attacks and malware on mobile devices such as a cell phones, smartphones or PDAs,...
Converged logical and physical security
A security management system that includes a hierarchical security platform, converged IT and physical security management, unified credentialing, credential...
Systems and methods for management of secure data in cloud-based network
Embodiments relate to systems and methods for the management of secure data in a cloud-based network. A secure data store can store sensitive or confidential...
System and method for an isolated process to control address translation
A system, method, and computer-usable medium for an isolated process to control address translation. According to a preferred embodiment of the present...
Solid-state storage subsystem security solution
A solid-state storage subsystem, such as a non-volatile memory card or drive, includes a main memory area that is accessible via standard memory access commands...
Methods used in a secure memory card with life cycle phases
A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain...
External signature device for a PC with wireless communication capacity
External signature device for a PC, with capacity for wireless communication with the computer, which can be used immediately in electronic banking and...
Real-time identification of an asset model and categorization of an asset
to assist in computer network security
A unique identifier is assigned to a network node and is used to obtain an "asset model" corresponding to the node and to determine whether the node is a member...
Secure inter-process communication for safer computing environments and
Techniques for Inter-Process Communication (IPC) in a more secure manner are disclosed. A communication component operating outside of an operating system can...
Systems and methods for managing converged workspaces
Embodiments provide systems and methods for managing converged workspaces that go beyond storing related files and additionally include other features such as...
System and method for storage operation access security
A method and system for controlling access to stored data is provided. The storage access control system leverages a preexisting security infrastructure of a...
Trusted service manager (TSM) architectures and methods
A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a...
Dynamic aggressive/passive pegged trading
A computer-implemented system and method for executing trades of financial securities according to a combination passive/aggressive trading strategy that...
Methods for providing secure eCommerce transactions
A method of facilitating an eCommerce transaction between a consumer and an eCommerce merchant via a third party entity is provided. The eCommerce merchant...
Methods and systems for power systems analysis: a non-iterative state
solver/estimator for power systems...
Described are software tools and techniques for use in power system operations and control, enabling direct non-iterative solution and estimation of the state...
System and method for automatic data security, back-up and control for
Systems and methods for providing security and control of mobile communications device activity including at least one mobile communication device with software...
Encrypted file system mechanisms
Mechanisms for providing an encrypted file system are provided. The mechanisms use a combination of encryption methodologies so as to reduce the amount of...
Protocol for secure and energy-efficient reprogramming of wireless
multi-hop sensor networks
A protocol for optimizing the energy for code upload to sensors in a wireless sensor network and speeding up the dissemination if multiple sources of code are...
Post deployment electronic document management and security solution
A method for managing deployed electronic documents that can begin when the deployed electronic document is accessed. A data probe can be automatically conveyed...
Traceability method for an electronic payment terminal in the event of a
theft thereof, and corresponding...
A traceability method is provided for an electronic payment terminal, in the event of a theft thereof. The method includes the following steps: detection of a...
Optical recording medium and method of manufacturing the same
Recording and reproducing characteristics and data saving reliability are secured in a write-once two-layer recording medium. A second recording layer from a...
Automatic surgical sponge counter and blood loss determination system
A surgical sponge detection system includes a plurality of surgical sponges (2) having radio frequency identification tags (1) securely attached thereto and a...
Hand-operated document reader/imager with document retention device
including manually-powered anti-skew...
A hand-operated document processor includes a base including a perforated bed for receiving a document containing magnetic ink character data to be read and...
System and method for managing the design and configuration of an
integrated circuit semiconductor design
A system and methods that facilitate the design process and minimize the time and effort required to complete the design and fabrication of an integrated...
Secure data strategy for vehicle control systems
A method of providing secure data from vehicle operational variable data that includes a plurality of data message bits includes the steps of dividing the...
Method for securing data and device for implementing the same
A method and system to ensure the integrity of data in a data-processing device, a data packet is read from a memory and checked to determine whether the data...
Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
System, method and apparatus for electronic ticketing
The present invention provides a system, method and apparatus for securely granting access to an event. For example, in one embodiment of the present invention,...
Secure direct platter access
Bulk data transfers by directly accessing a persistent and secured area on the data storage device, e.g., a disk drive having a magnetic storage medium, without...
Parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
Systems and methods of providing security and reliability to proxy caches
The present solution provides a variety of techniques for accelerating and optimizing network traffic, such as HTTP based network traffic. The solution...
Method of non-intrusive analysis of secure and non-secure web application
traffic in real-time
Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be...
Hosted system for enabling enterprises to build and operate online
A system that enables enterprises to design, create integrate and operate online communities. The system operates as an on-demand hosted platform ...
Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
Method for verifying rights contained in a security module
A method of verification of rights is disclosed, contained in a security module associated to an apparatus processing broadcasted digital data. The apparatus is...
Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, especially to...
Method and system for dynamically terminating wireless and wireline calls
A third party tandem provider that intercepts and routes voice and data traffic between telecommunications carriers, e.g., wireless carriers, local exchange...
High-speed WAN to wireless LAN gateway
A gateway interconnecting a high speed Wide Area Network (WAN) and a lower speed Wireless Local Area Network (WLAN) is provided. The high speed WAN is...
Method for controlling a pre-charge process and a respective integrated
A method of controlling a pre-charge process of a data line (21, 22) in an integrated circuit (100) comprises the step of monitoring a rate of change of a...
System and method for disabling access to non-volatile storage in a
A multi-function peripheral (MFP) device having enhanced security for processed data is disclosed. The MFP includes both a non-volatile memory and a volatile...
Passive tag including volatile memory
A passive tag including a volatile memory is provided. The passive tag includes: a sensing unit which senses or measures information about environmental...