At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Multifunction peripheral and method for controlling the same
A job processing apparatus that can communicate with a security server configured to manage an access right to data, executes a job for inputting data, stores...
Methods and apparatus for configuring a process control system with a
configuration editor executing on a...
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of...
Data writing method for flash memory and error correction
encoding/decoding method thereof
A data writing method for flash memory and an error correction encoding/decoding method thereof are disclosed. In an embodiment of the data writing method, a...
Synchronous and asynchronous continuous data protection
A method, system, and computer program product for providing continuous data protection for write data supplied from a host incorporating a processor device to...
Method and system for bootstrapping a trusted server having redundant
trusted platform modules
Multiple trusted platform modules within a data processing system are used in a redundant manner that provides a reliable mechanism for securely storing secret...
Reprogrammable security for controlling piracy and enabling interactive
Technologies to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content....
Systems and methods for software application security management
Apparatus and method for managing password information associated with a service account are disclosed. In some embodiments, a service account management system...
Data path security processing
Methods and associated systems provide secured data transmission over a data network. A security device provides security processing in the data path of a...
Process and streaming server for encrypting a data stream with bandwidth
There is disclosed a process for encrypting a data stream to secure the data stream for single viewing and to protect copyrights of the data stream....
Method and apparatus for providing an interface for a messaging mailbox
A method and apparatus for accessing messages from a message server. Messages are stored on the message server in their current format without transcoding. When...
Method and system for secure distribution and utilization of data over a
A method of securely utilizing downloaded data includes the steps of opening a media player; opening a data file; requesting a portable token from and used by a...
Proxy communication string data
Systems, methods and apparatus for a distributed security that detects proxied resource requests. The system can identify proxy strings, each of the proxy...
Securities market and market maker activity tracking system and method
A method, system and computer program to monitor securities market activity to seek out imbalances in market activity that could lead to a price change in a...
Automated real-time secure user data sourcing
Profiling data for a consumer can be generated from one or more of the consumer's own financial records. The profiling data can be provided by the consumer him...
Method of providing video call service in mobile station in a weak signal
Improving the audio QoS of a video call service in a weak signal environment is accomplished. To do this, even if data is damaged in a weak signal environment...
Swing performance analysis device
A swing performance analysis device (10) is described. The device (10) includes a sole single axis accelerometer securable to an entity (60, 70) to be swung to...
Automated banking machine that operates responsive to data bearing records
An automated banking machine operates responsive to data read from data bearing records to cause financial transfers. The machine includes a card reader that...
Banking system controlled responsive to data bearing records
An automated banking machine is controlled responsive to data bearing records. The machine operates using data read from user cards by a card reader. The...
System and method for monitoring and analyzing multiple interfaces and
The present invention is a system and method for providing security for a mobile device by analyzing data being transmitted or received by multiple types of...
Security state vector for mobile network platform
State of security in a mobile communications network is communicated. Data regarding nature and severity of security events onboard at least one mobile platform...
Method and system for accessing a secure area
A system for accessing a secure area. In response to reading a plurality of security device orientations, the plurality of security device orientations are...
Consolidation of user directories
A method for automatic user authentication is described. In response to a coupling of a separate hardware security device to a data processing system,...
Method for provisioning policy on user devices in wired and wireless
A method for provisioning client devices securely and automatically by means of a network provisioning system is disclosed. Provisioning occurs before the...
Secure read and write access to configuration registers in computer
The disclosed embodiments relate to a secure configuration space for a computing device. Each of the configuration resisters in a configuration space are...
Memory management system and method providing linear address based memory
A memory management unit (MMU) is disclosed for managing a memory storing data arranged within a plurality of memory pages. The MMU includes a security check...
System and method for initializing secure communications with lightweight
System and methods for initializing secure communications with lightweight devices are described herein. In one embodiment, the method includes enabling a...
Data processing systems and methods
Various improvements to data processing systems involve enhancements to BIOS functionality, use of identifiers associated with specific instances of hardware,...
Concatenating secure digital input output (SDIO) interface
An apparatus and a process for transferring packet data includes receiving packets from a first interface such as a network interface and transferring data to a...
Method for establishing secure communication link between computers of
virtual private network
A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a...
Secure card with stored biometric data and method for using the secure
A secure card comprising biometric data of an individual for identifying or confirming authority of the individual. Prior to issuing the secure card a...
Method and related device for hardware-oriented conversion between
arithmetic and boolean random masking
A method for secure conversion between two different random markings used for cryptographic functions, converts a first binary data word, masked by a binary...
Container with removable data storage mechanism
A container may be formed with a pocket to securely receive a tag, such as a radio-frequency identification tag. The tag is secured within the pocket such that...
Method and system for providing tracking services to locate an asset
The present invention is directed to a method of asset location. Location data is received from a cellular transmitter associated with a selected asset, which...
Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
System and method for secured voting transactions
A secured electronic system and method for taking and counting votes. A database of unique ballot security codes, each ballot security code consisting of a...
Currency recycler reconcilement activity
A currency handling system, for example, a currency recycler or depository machine, may be configured to process currency transactions, including receiving one...
Distributed computer network security activity model SDI-SCAM
A distributed multi-agent system and method is implemented and employed across at least one intranet for purposes of real time collection, monitoring,...
Automating software security restrictions on system resources
Security components of managed computers are configured using inoculation data. Inoculation data can be retrieved from an inoculation data provider. The...
Method and apparatus for securing the privacy of sensitive information in
a data-handling system
A data-handling system (20) is arranged to scan through data it holds for instances of sensitive information as identified by reference (35) to a set of...
Data processing apparatus and method for generation of protection
compression encoded data
An encoding data processing apparatus is described which is operable to generate protected compression encoded data representative of protected media signals....
Secure IP access protocol framework and supporting network architecture
A protocol framework for a Secure IP Access (SIA) method, and supporting components deployed on IP hosts and IP networks. Using this method, an IP host can...
System and method for enhancing network security
A method of transmitting data via a network of computers comprises receiving, at a first node of the network and from a second node of the network, first...
Data storage system
The present invention is directed to an archival data storage system. The archival data storage system includes write once and read many (WORM) capability, data...
System and method for access control and for supply chain management via a
shared bill of material
A system for securely uploading and downloading data from a client to a remote data storage location under control of a remote application program. The data is...
Ergonomic man-machine interface incorporating adaptive pattern recognition
based control system
An adaptive interface for a programmable system, for predicting a desired user function, based on user history, as well as machine internal status and context....
Postal indicia generating system and method
A method for generating a postal indicia associated with a mailpiece is disclosed. The method includes generating an indicia data stream including a postal...
EMV transaction in mobile terminals
A mobile terminal is enabled to conduct an EMV transaction. A wireless access node in the EMV card-reader terminal is provided for connecting a mobile terminal...
Method and system for mobile IP-nodes in heterogeneous networks
A method for establishing an optimized communication link between mobile network nodes. An interface management module of a first mobile network node checks the...
Method of and system for authenticating an item
A method of authenticating the identity of an item bearing or associated with a printed security marker, the method comprising: a. printing the security marker...
System and method for securing data
Systems and systems that protect data are provided. In one embodiment, a system may include, for example, a memory and a processor. The memory may store, for...