At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for enabling rendering of electronic media content via a
secure ad hoc network configuration...
An ad hoc network enabled to handle secure data may be created for a specified user via a handheld wireless communication device (HWCD) such that rightful...
Highly miniaturized, battery operated, digital wireless camera using
programmable single chip active pixel...
A miniaturized camera which is programmable and provides low power consumption. An active pixel image sensor used in the highly miniaturized camera provides...
Method and apparatus for providing a global secure user plane location
A method and apparatus for providing assistance data for satellite positioning system receivers utilizing a secure user plane location (SUPL) service. In one...
Electronic flight data display instrument
An electronic display instrument configured to secure in a desired position over multiple pre-existing instrument holes in a dashboard of an aircraft in place...
Identification with RFID asset locator for entry authorization
A system for controlling access at secure facilities to locations and assets contained in those locations, comprising a biometric identification device, an RFID...
A container security device includes a housing, electronic circuitry, and cabling. The electronic circuitry is disposed within the housing, and includes first...
Capture and utilization of real-world data for use in gaming systems such
as video games
A portable sensor unit for capturing motion and/or other data may be securely mounted on objects such as a user's limb, a vehicle, or other items. The sensor...
Diagnostic data capture control for multi-domain processors
There is provided a processor operable in a first domain and a second domain, the processor comprising: monitoring logic operable to monitor the processor and...
Secured storage method of encrypted data on a personal digital recorder
The objective of the present invention is a storage method in a decoder of an event encrypted by control words that guarantees the access to this event at...
Systems and methods for deployment of secure shell devices
A shell device with minimal software and/or hardware resources can download from a server configuration information and/or user data in order to allow the shell...
Enforcing security groups in network of data processors
A technique for securing message traffic in a data network using various methods for distributing security policies and keys, where policy definition is...
Securely sharing applications installed by unprivileged users
In one embodiment of this invention, a computer system performs a method for securely sharing applications installed by unprivileged users. The method involves...
Systems and methods for trading a trade list in financial markets
Systems and methods are provided for maintaining neutrality while trading a list of securities using an algorithmic trading facility coupled with at least one...
Mobile communications device with security features
A mobile communications device for communicating with a wireless network is described. The device includes a processor, a communications sub-system connected to...
Offline message security via selective data replication
A method, system and apparatus for the offline securing of messages through selective security data replication. A method for selectively replicating security...
Removable data-storage device
A removable data-storage device. The removable data-storage device includes a main data-storage unit, an exterior housing for containing the main data-storage...
Power distribution system
A back-wiring board that connects to a main circuit board of a power distribution system. The back-wiring board includes a plurality of connectors configured to...
Image processing device, method and program product processing barcodes
with link information corresponding to...
In a copy generation management on paper, the present invention aims to detect a falsification in embedded information and increase the capacity of embedded...
Integrated motion-image monitoring device with solar capacity
Security systems and methods are implemented using a variety of devices and methods. According to one such implementation, a security system uses a controller...
Automated banking machine operated responsive to data bearing records
An automated banking machine is operative to carry out transactions using data read from user cards through operation of a card reader. The automated banking...
Method for vehicle internetworks
Vehicle internetworks provide for communications among diverse electronic devices within a vehicle, and for communications among these devices and networks...
Method and system for recording network traffic and predicting potential
Recording network traffic is disclosed. Data associated with a network flow are monitored. If it is determined that the data associated with the network flow...
Encryption apparatus, program for use therewith, and method for use
An encryption apparatus capable of effectively preventing encryption data from being illegally generated is provided. Based on apparatus identification data of...
System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
Streaming content in guest mode
The present application relates to systems, apparatus and methods for transmitting image data from a content source to an image display in a dual mode system...
Method and system for providing terminal view access of a client device in
a secure network
Methods, computer products, and systems are described for providing terminal view access of a client device in a secure enterprise network. One method includes...
Secure device sharing
A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device...
Method for protecting computer programs and data from hostile code
A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can...
Identity authentication and secured access systems, components, and
Security tokens contain data that is each uniquely encrypted based on a unique biometric identifier of an authorized user of that token. Decoders receive the...
Data certification method and apparatus
Apparatus for certifying electronic data supplied by a user receives data to be signed, supplied by the user from a source device, at a certifying apparatus...
Method and system for secured drive level access for storage arrays
The present disclosure provides a methodology by which disk level access for storage drives of a storage array may be highly secured based on permission...
Solution for handling URL-substitution for data access in a private
Disclosed are methods and apparatus for handling requests for data from a private network. In general terms, a client who wishes access to secure data, such as...
Method and system for secure distribution and utilization of data over a
A method for distributing data over a network includes the steps of establishing a secure connection between a client and a server; issuing a certificate and a...
Secure normal forms
Techniques for implementing secure normal forms are provided. In one embodiment, in response to a request for data from a client, a database server is operable...
Benefits administration system and methods of use and doing business
An automated benefit administration system and methods of use and doing business. The full system includes a wide range of features including application of...
Raman spectrometry authentication
A method and apparatus for authenticating items having a security mark containing a DNA fragment to prevent fraud uses a Raman spectrometer to generate a...
Cryptographic key split binder for use with tagged data elements
A process of cryptographically securing a data object including one or more respectively tagged data elements includes selecting a tagged data element from...
Protecting against security attack
A communication device having a private key and configured to implement an elliptic curve security mechanism for successful operation of which it: (a) receives...
Permutation data transform to enhance security
A data input is divided into two segments; the second segment is also divided into groups. Bits in the first segment are used to control the application of...
Secure roaming between wireless access points
A system, method, and computer readable medium for enabling roaming of wireless client stations among wireless access points, wherein a gateway programmed to...
Method and terminal for transmitting uplink data
Embodiments of the present invention disclose a method for transmitting uplink Ethernet data in a coaxial network, a Coaxial Network Unit (CNU) and a Coaxial...
Modular protective housing with peripherals for a handheld communications
A peripherals device for coupling with a handheld communication device includes an interface to the handheld communication device and a processor for performing...
Disaster vulnerability assessment in buildings
The number and identities of people in a building along with personal data that is useful in disaster response planning are determined from a database receiving...
System and method for analyzing faulty event transmissions
A system and method are disclosed for recording and evaluating faults in event transmissions between security system components. A panel in a monitored building...
System and method for securing a credit account
A system and method is disclosed for verifying a commercial transaction between a card-holder, a merchant, and a credit card company. The card-holder makes a...
Secure payment system
A system for the authentication by a card-issuing financial institution of identifying information of a card-holding user of a public data network. The system...
Screening system for objects in transit
The present invention relates to the screening of objects in-transit and materials, for security purposes (i.e. explosives detection). The invention provides an...
Radio frequency identification (RFID) system for manufacturing,
distribution and retailing of keys
A key assembly having an identification member secured to the key. In one embodiment, the identification member includes a programmable device that contains...
Secure media path system and method
Many media playback devices have a secure environment, with media decrypter and decoder components, and an insecure environment, with intermediate media...
Method and system for securely protecting data during software application
Techniques for use in enterprise and similar computing systems securely protect data during software application use by generating private table seeds as a...