At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Data corresponding to a set of securities is identified. For each security in the set, data corresponding to a legacy risk contribution from a corresponding...
Conducting a payment using a secure element and SMS
A method for transmitting data between a wireless communication and a remote server. The method includes running a mobile application on the wireless...
Automatic data encryption and access control based on Bluetooth device
A method, apparatus, and system for using Bluetooth devices to secure sensitive data on other Bluetooth devices is described. A Bluetooth device is paired with...
Disk drive, method for measuring clearance and method for writing servo
A disk drive. The disk drive includes a plurality of head-sliders, an actuator, a plurality of clearance adjustment sections, and a controller. Each head-slider...
Automatic system and methods for measuring and evaluating at least one of
mass vision, cognition, knowledge,...
Integrating automatic systems and methods for rapid and objective mass tests, evaluations, measurements, screenings, trainings, or any combination thereof are...
Banking system operated responsive to data bearing records
A system for use in banking operates responsive to data included in data bearing records. The system is suitable for securing the contents in safety deposit...
Addressing security in writes to memory
A computer includes a processor. When an instruction to be executed by the processor involves writing to memory, the write can be redirected to a temporary page...
Method to create an OSI network layer 3 virtual private network (VPN)
using an HTTP/S tunnel
A method of creating and using a virtual private network (VPN) client encrypts network communications to server/gateways using strong algorithms to ensure data...
Secure peer-to-peer object storage system
A peer-to-peer (P2P) networking system is disclosed that provides a large, persistent object repository with the ability to easily scale to significant size....
Scoped access control metadata element
Methods, systems, and data structures for communicating object metadata are provided. A generic metadata container is presented that allows object metadata to...
Biometric security using neuroplastic fidelity
A system, method and program product for providing biometric security using neuroplastic fidelity. A method is disclosed that includes: receiving biometric...
System for franking mail items with data document or file associated
This invention relates to a machine for franking mail items, comprising means for printing postal indicia on a mail item and means for also printing on this...
Methods for authentication
A method for managing access to application software contained on a computer system or network. The computer system utilizes an authentication component that is...
Dynamic credit management
A method for providing a financial evaluation of at least one financial instrument or of an issuer supports the provision of a dynamic credit limit. A dynamic...
Fair value model based system, method, and computer program product for
valuing foreign-based securities in a...
A system and method for determining fair value prices of financial securities of international markets includes steps of selecting a universe of securities of a...
Broadcasting medical image objects with digital rights management
Techniques are disclosed for efficiently and securely handling of patient medical images and data. In one particular embodiment, an acquisition service and...
System and method for managing patient-related data
A system and method for managing patient-related data includes transmitting a power signal to an orthopaedic implant, receiving implant identification data from...
Secure digital forensics
A security module is used to perform an audit of both a computer memory and the computer's processor status. The security module may assert itself as a bus...
Method and device for compensating for positional and shape deviations
A method for compensating for at least one of positional deviations and shape deviations in NC-controlled cutting production machines where the method includes...
GPSS-based system and method for enabling or disabling cellphones in
A system and method are described for initiating, enabling, disabling or restoring cellphone operations when the cellphone is in a zone, which is where...
Method and system for collecting wireless information transparently and
A method of collecting information on a wireless device. A wireless device may comprise a processor, a transceiver, a memory and a data collecting component....
Provisioning of wireless connectivity for devices using NFC
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near...
Secure wireless local or metropolitan area network and related methods
A secure wireless local or metropolitan area network and data communications device therefor are provided, where the device transmits plain text in an encrypted...
Optical storage media and the corresponding cryptography for data
Based on the demand of developing a data encryption technique for the optical storage media, the present invention discloses a cryptography for data encryption...
Exponentiation ladder for cryptography
Method and apparatus for data security using exponentiation. This is suitable for public key cryptography authentication and other data security applications...
Decoding message data embedded in an image print via halftone dot
What is disclosed is a novel system and method for encoding/decoding data in a cover contone image via halftone dot orientation modulation. Arrays of halftone...
Customization of personal emergency features for security systems
The inventive system and method comprises a processor operable to detect an event, storage having detailed data corresponding to the event, an input device...
Internet linked environmental data collection system and method
An environmental data collection system and method is provided having an internet link for providing an additional level of security for a remotely controlled...
Smart apparatus for making secure transactions
The disclosed invention relates to an apparatus and method for making secured transactions. Such an apparatus may include a smart card device configured with a...
Automated banking machine operated responsive to data bearing records
An automated banking machine operates responsive to data read from user cards. The automated banking machine operates responsive to the card data to carry out...
Apparatus and method for VPN communication in socket-level
Provided is an apparatus and method for virtual private network (VPN) communication in a socket level that can be applied in an Internet Protocol version...
Method for managing security in a mobile communication system using proxy
mobile internet protocol and system...
A security management method in a mobile communication system supporting Proxy Mobile Internet Protocol (IP). In the security management method, a Mobile Node...
Devices, systems, and methods for providing increased security when
multiplexing one or more services at a...
Systems, devices, and methods are disclosed for providing increased security when multiplexing one or more services at customer premises. Such systems and...
System and method for configuring devices for secure operations
Systems and methods for establishing a security-related mode of operation for computing devices. A security-related mode of operation is established through...
Data processing apparatus, program managing apparatus, control program
updating method, program managing...
The object is to provide a data processing apparatus, a program managing apparatus, a program managing system, etc., capable of securely and efficiently...
Method and system for securing network data
Method and system for storing data in a storage device accessible through a storage area network is provided. The method includes receiving data from a host...
Secure porting of information from one device to another
A generic access card is paired with a data destination device by insertion into its card slot, and the public portion of a public/private key is stored in the...
Multi-data rate security architecture for network security
An architecture and associated methods and devices are described in which a first selectable data path may be associated with a first port operating at a first...
Database system and method for encryption and protection of confidential
A database system for encryption and protection of confidential data is provided. The database system includes a data source system receiving confidential data...
Secure data transfer using an embedded system
A method and device for securing data transmission via an embedded system that is operationally coupled to a local device and a remote computing system using a...
Program security through stack segregation
For each process a stack data structure that includes two stacks, which are joined at their bases, is created. The two stacks include a normal stack, which...
Method and system for communication and collaboration between a patient
and healthcare professional
Methods and platforms for enhancing collaboration and communication between a patient and his healthcare team are described. A personal health record is created...
Securing serial console redirection via serial-over-LAN (SOL)
An information handling system has the capability of securing serial console redirection via serial-over-LAN (SOL) by using a baseboard management controller...
Systems and methods for processing data flows
Methods and systems for flow processing and switching, security, and other network applications, including a facility that processes a data flow to address...
Systems and methods for processing commercial financial transactions
Systems and methods for processing commercial financial transactions are provided. In one aspect, a method for processing a commercial financial transaction...
Financial data processing system
To process financial articles of trade, real time data is collected from a plurality of liquidity destinations in trading at least one of securities,...
Methods, systems and securities for assuring a company an opportunity to
sell stock after a specified time
Various embodiments of the present invention relate to methods, systems and securities for assuring a company an opportunity to sell stock (e.g., common stock)...
Traffic redirection in cloud based security services
Systems, methods and apparatus for tunneling in a cloud based security system. Management of tunnels, such as data tunnels, between enterprises and processing...
Image processing apparatus and its method
Even through security information is embedded in a printed document, if the security level is changed after original data is printed, it is impossible to change...
Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...