At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Platform for analyzing the security of communication protocols and
A security analyzer tests the security of a device by attacking the device and observing the device's response. Attacking the device includes sending one or...
Secure authentication for authorization for transaction processing
A method and apparatus for authenticating and authorizing online transactions. An authentication cookie is transmitted to a client system. The authentication...
Security flash memory, data encryption device and method for accessing
security flash memory
The present invention discloses a security flash memory which includes a flash memory chip with a plurality of data transmission terminals, and a data...
System and method for securely saving a program context to a shared memory
A system, method and program product for securely saving a program context to a shared memory is presented. A secured program running on an special purpose...
Method of protecting microcomputer system against manipulation of data
stored in a memory assembly of the...
A method of protecting a microcomputer system against manipulation of data stored in a memory assembly of the microcomputer system is provided. The method may...
Distributed processing system, distributed processing method and image
A distributed storage system implements high-speed data reconstitution processing while ensuring a high security level. Devices (63) in a device group (51) with...
Application-specific network-layer virtual private network connections
Techniques are described for providing secure communication of network traffic from specific applications operating on a client device to a server device using...
Systems and methods for managing state in a cluster of servers
The present invention provides systems and methods that can be used to manage state on a cluster comprising a plurality of application servers. A system...
Method and system for mirroring dropped packets
A system for mirroring dropped packets by extending port mirroring. Networking devices, such as firewalls and routers drop some packets during data transmission...
Geo-positionally based data access security
Methods, systems, and computer program products for implementing geo-positionally based data access security is provided. A method includes receiving a request...
Aggregation system clearing a security response
Machine, method for use and method for making, and corresponding products produced thereby, as well as data structures, computer-readable media tangibly...
Methods and systems for controlling access to custom objects in a database
In embodiments, methods and systems for controlling access to custom objects are provided. These techniques for controlling access to custom objects can enable...
Multifactor authentication with changing unique values
A method of authentication includes the steps of providing a transaction service provider having a secure server; providing a user; requesting access...
Techniques for retaining security restrictions with file versioning
Techniques are presented for retaining security restrictions with file versioning. Files are versioned in such a manner that metadata including full directory...
System and method for prepay account management system
A prepay account management system comprises a secure data link operable to transmit a prepay customer account and meter data, a prepay server operable to...
System and method for facilitating network connectivity based on user
A computer system for facilitating user connectivity in a computer network includes an attention manager, an identity manager, and an introduction manager. The...
Medical treatment system with a device for supplying patient-related data
The invention relates to a medical treatment system, which has at least one device for carrying out a medical treatment, in particular dialysis treatment and a...
Remote patient support and care by relatives
A telemonitoring central server 12 supports secure data exchange between a number of users, such as a patient, family and friends, medical personnel, suppliers,...
Door-lock control system, door-lock control method
A door-lock control system includes: a door lock device; a current position detection unit; a data recording unit; a public security situation determination...
Intrusion detection system for use on single mode optical fiber using a
A telecommunications optical fiber is secured against intrusion by detecting manipulation of the optical fiber prior to an intrusion event. This can be used in...
Adaptive and progressive protection of fixed images encoded in wavelets
A process for secured distribution of fixed numerical images according to a nominal format resulting from numerical encoding in wavelets, represented by a...
System and method for modulus obfuscation
Disclosed herein are methods for obfuscating data on a client, on a server, and on a client and a server. The method on a client device includes receiving input...
Method and device for coding articles
The invention is about a marking method and a corresponding coding center device for the marking of individual items (1), such as security documents, currency,...
System and method for interfacing with heterogeneous network data
A prevention-based network auditing system includes a plurality of heterogeneous information sources gathering information about the network. An audit server...
Imaging apparatus having automatic backup function and method for
controlling the same
An imaging apparatus having an automatic backup function and a method for controlling the same are disclosed which can more securely store particular data,...
Semiconductor memory and method of testing semiconductor memory
A memory-specific tester has a buffer storing input pattern data and output expectation data. An address included in the input pattern data read from the buffer...
Information storage system
A system for storing information having a predetermined use which requires the information to be secured. The information may comprise credit card details used...
Image formation system having authentication function
Image data is transmitted from a client PC to an image formation apparatus. Upon printing, an external server conducts an authentication process. A certificate...
Method and system for asymmetrically encrypting .ZIP files
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data...
Deployable secure communication system
A secure Voice-Over-IP (VOIP), video and data network functionality in a single, small size deployable case, for a remote user. While capable of secure...
Systems and methods for providing security for computer systems
Hardware and/or software countermeasures are provided to reduce or eliminate vulnerabilities due to the observable and/or predictable states and state...
Method and system for altering the configuration of a data warehouse
Disclosed are methods usable by non-experts for altering a configuration of a data warehouse. The initial configuration of the data warehouse is represented in...
Secure payment service and system for interactive voice response (IVR)
A secure payment method, system or computer readable medium for a merchant's interactive voice response system are disclosed. The merchant's interactive voice...
Investment company that issues a class of conventional shares and a class
of exchange-traded shares in the same...
An automated method is provided for administering a single investment company that issues one or more classes of shares that are bought from and redeemed with...
Feedback loop system for passenger safety
Methods, systems and apparatus for automatically ensuring passenger safety by identifying article(s) in need of securing in a vehicle and attaching at least one...
Secure debug interface and memory of a media security circuit and method
A method, system and apparatus of a secure debug interface and memory of a media security circuit and method are disclosed. In one embodiment, a host processor,...
Multi-level data encryption and decryption system and method thereof
A multi-level data encryption and decryption system and a method thereof are provided. The method includes dividing a data into a plurality of sub-data blocks...
Device, system and method for cryptographic key exchange
A method is disclosed whereby two parties can establish a cryptographic key for secure communications without any prior distribution of secret keys or other...
Method for protection switching of geographically separate switching
A protocol is provided being executed with a redundancy of 1:1. As a result, an identical clone, with identical hardware, identical software and an identical...
Dynamic debugging dump for game console
An error data dumping process on a game console is described, in which a request for an error data dump may be initiated using commands mapped to a handheld...
Management of computer security events across distributed systems
A computer receives a system event initiated by an initiating client associated with a user. The system event comprises a plurality of data elements associated...
Byte-distribution analysis of file security
A method for scanning files for security, including receiving an unfamiliar file for scanning, if the determining indicates that the mime type is suitable for...
With regard to data, stored in mobile phone 40, whose a security level is high and contents whose copyrights are protected, mobile phone 40 encapsulates data...
Secure mobile platform system
The present invention is directed toward a secure platform which enables mobile devices, such as a cell phones, smartphones, or PDAs, to have relationships with...
Method and apparatus for distributed reconstruct in a raid system
Embodiments of the present invention provide techniques for distributing the reconstruction process of a failed storage device in an array of storage devices to...
Apparatus and a method for reporting the error of each level of the tunnel
data packet in a communication network
The invention provides methods and devices for reporting and parsing the errors of a packet based on IPSec protocol family in a communication network....
Secure identity and privilege system
A process for generating a unique, secure and printable identity document, for authenticating the use of the document, and for granting privileges based on the...
Method and a system for protecting path and data of a mobile agent within
a network system
Secure message transfer of at least one message from a sender to a receiver within a network system may be provided. For example, a message structure...
Secure method of termination of service notification
A method for notifying a client device of termination of at least one service provided to the client device by a server system within an enterprise network is...
Computer program product and computer system for peer-to-peer
An encrypted request for peer-to-peer communication includes a requesting peer encrypting a requested peer identification using a public key of a security...