At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Protecting against security attack
A communication device having a private key and configured to implement an elliptic curve security mechanism for successful operation of which it: (a) receives...
Permutation data transform to enhance security
A data input is divided into two segments; the second segment is also divided into groups. Bits in the first segment are used to control the application of...
Secure roaming between wireless access points
A system, method, and computer readable medium for enabling roaming of wireless client stations among wireless access points, wherein a gateway programmed to...
Method and terminal for transmitting uplink data
Embodiments of the present invention disclose a method for transmitting uplink Ethernet data in a coaxial network, a Coaxial Network Unit (CNU) and a Coaxial...
Modular protective housing with peripherals for a handheld communications
A peripherals device for coupling with a handheld communication device includes an interface to the handheld communication device and a processor for performing...
Disaster vulnerability assessment in buildings
The number and identities of people in a building along with personal data that is useful in disaster response planning are determined from a database receiving...
System and method for analyzing faulty event transmissions
A system and method are disclosed for recording and evaluating faults in event transmissions between security system components. A panel in a monitored building...
System and method for securing a credit account
A system and method is disclosed for verifying a commercial transaction between a card-holder, a merchant, and a credit card company. The card-holder makes a...
Secure payment system
A system for the authentication by a card-issuing financial institution of identifying information of a card-holding user of a public data network. The system...
Screening system for objects in transit
The present invention relates to the screening of objects in-transit and materials, for security purposes (i.e. explosives detection). The invention provides an...
Radio frequency identification (RFID) system for manufacturing,
distribution and retailing of keys
A key assembly having an identification member secured to the key. In one embodiment, the identification member includes a programmable device that contains...
Secure media path system and method
Many media playback devices have a secure environment, with media decrypter and decoder components, and an insecure environment, with intermediate media...
Method and system for securely protecting data during software application
Techniques for use in enterprise and similar computing systems securely protect data during software application use by generating private table seeds as a...
Detecting rogue access points in a computer network
Detecting an unauthorized wireless access point in a network uses a detector. A rogue access point detector receives an incoming data packet which is scanned...
Method and apparatus for making a decision on a card
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and...
Memory card, data exchange system, and data exchange method
By enabling to write information which is readable only by an IC card owner on an IC card without inputting a PIN and to authenticate a creator of the written...
Secure key distribution to internet clients
A server may bridge between a wide area network, such as the Internet, and a local area network and may process authentication requests from clients on the wide...
Systems and methods for increased security during logging in to web site
A user at a computing device interacts with a networked site so that the user can log in thereto. The site receives a selection to log in and in response...
System and method for remote reset of password and encryption key
A method for securing data and resetting a password using a content protection key is provided, in which the content protection key itself is protected by a...
Member certificate acquiring device, member certificate issuing device,
group signing device, and group...
It is an object of the present invention to enhance the security and reduce the data amount of data to be handled in a group signing system, in which when the...
Flash memory apparatus and method for securing a flash memory from data
A data backup method for a flash memory is provided. After writing of data to a plurality of written pages of a first block of a flash memory is completed, a...
System and method for mail verification
A system and method is provided for transmitting mail verification data over a wide area network, such as the Internet, in response to receiving and...
Data processing for an exchange traded fund
An accounting system allows posting transactions to a general ledger of an Exchange Traded Fund. The accounting system includes a computer-assisted process that...
Information processing device and method
A configuration is provided which enables usage management and secure data management of data newly generated or obtained that is different from data already...
Semiconductor memory device having DRAM-compatible addressing mode and
data processing system including same
In synchronism with an active command, a row address and a column address are simultaneously received, and a page address is received in synchronism with a read...
Image processing apparatus, encrypted job execution method thereof, and
This is to provide an image processing apparatus and others capable of ensuring security by shortening the connecting time of an external recording medium when...
Split delay-line oscillator for secure data transmission
A split delay-line oscillator for secure data transmission is disclosed. In one embodiment, an apparatus for a split delay-line oscillator for secure data...
Wall integrated multisensory therapy device
A wall integrable multisensory therapy device for securement in a wall of a room dedicated for physiological therapeutic treatment is described. The device has...
Systems and methods for message threat management
The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related...
Unit using OS and image forming apparatus using the same
A chip mountable on a replaceable unit used in an image forming job is disclosed. The chip includes a central processing unit (CPU) to perform at least one of...
Unit using OS and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitoring memory (CRUM) unit used in an image forming job includes a central processing unit (CPU) with its own...
Computer system and method for secure installation and operation of
A computer system provides for the secure installation and operation of software. The computer system includes a platform, such as a personal computer, having a...
Low-latency data decryption interface
Methods and apparatus for reducing the impact of latency associated with decrypting encrypted data are provided. Rather than wait until an entire packet of...
Method of storing and accessing header data from memory
Methods of storing and accessing data using a header portion of a file are disclosed. In an embodiment, a method of storing content in a non-volatile memory is...
System and method to curb identity theft
Personal identity-identifiers such as social security numbers, finger prints, and biometric identifiers are fixed for life; once disclosed they cannot reliably...
Securing DBMS event notifications
One embodiment of the present invention provides a database server for securing database event notifications. The server includes a session key creation...
Systems and methods for securing customer data in a multi-tenant
Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to...
Secure franking machine
A franking machine is described including a unit for generating franking data and a unit for printing data connected to the data generating unit and adapted to...
End-to-end secure payment processes
A method of calculating the quality of a data record having a plurality of data fields involves indentifying individual fields in the data record that are...
Method and system to process payment
Provided is a method and system for payment processing, including emailing a billing statement including an online payment hyperlink to a payer by a biller. The...
Block trading system and method providing price improvement to aggressive
The present invention comprises systems and methods for facilitation of electronic securities trading. A preferred system embodiment comprises a trade...
Computer software program for mental health professionals
A computer software program that will allow mental health practitioners to enter data into portable files and send information to various professional...
Systems and methods for de-identification of personal data
According to some embodiments, original data is retrieved from an original data source. The original data may be automatically searched for potential personal...
System for positioning a wire using sensor information
A system for determining coordinates for nodes on a wire secured to tow lines of a floating vessel for analyzing geological formations is provided. The system...
Methods and apparatus related to sensor signal sniffing and/or analysis
The disclosure relates to Sensor security and Business Intelligence and more particularly to detecting and capturing Sensor information of data in a network...
System for supplying container security
A system for monitoring the contents of a closed container includes one or more sensors for monitoring the container contents, a signal receiving element...
Secure optical communication system
In various embodiments, a secure optical communication system is disclosed. Such a system may include a photon-pair generation circuit configured to generate...
Security device for cryptographic communications
Cryptographic systems and methods are provided in which authentication operations, digital signature operations, and encryption operations may be performed....
Method and system for secured wireless data transmission to and from a
The device tracking location adherence and route adherence technology, according to an exemplary embodiment of this invention, at least provides for secure...
A one-way router combines benefits of a network diode and router, and thus can route data between networks of varying confidentiality and/or integrity in a...