At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Packet classification in a network security device
Methods and apparatuses are described for inspecting data packets in a computer network. One or more data packets through the network have associated header...
Retaining apparatus for data storage device
A retaining apparatus for at least one data storage device includes a tray and a retaining device. The tray is used for receiving the at least one data storage...
Remote display tamper detection using data integrity operations
Methods and systems for detecting tampering of a remote display. According to one method, a first data integrity result is generated by performing a first data...
Electrical connector contacts retained by releasable first and second
inserts held by releasable first and...
In accordance with one aspect, a connector includes contacts meeting MIL-C-39029/57 or MIL-C-39029/58 without requiring a retaining clip to hold such contacts...
Banking system controlled responsive to data bearing records
An automated banking machine is operated responsive to data bearing records. The machine operates using data read from user cards and causes funds to be...
System and methodology for validating compliance of anti-piracy security
and reporting thereupon
A movie anti-piracy system with sensing and reporting is provided. An anti-piracy subsystem is utilized to preclude, interfere with and/or prevent copying of...
System and method for ARP anti-spoofing security
A system and method that provides for copying ARP replies, and generating data packets which include the ARP reply, and other information such as an...
Two-channel challenge-response authentication method in random partial
shared secret recognition system
Random partial shared secret recognition is combined with using more than one communication channel between server-side resources and two logical or physical...
Electronic device, information processing system, information processing
apparatus and method, program, and...
A user is enabled to easily access a data area on a network, and to use the data area with security, wherein a recording medium records an address for accessing...
Radio transceiver or other encryption device having secure
An encryption device includes a system processor having a first key for encrypting information. The system processor periodically generates random data strings...
Integrating legacy application/data access with single sign-on in a
distributed computing environment
The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is...
Configurable signature for authenticating data or program code
System and method for authenticating data or program code via a configurable signature. Configuration information is retrieved from a protected first memory,...
Central processing unit having branch instruction verification unit for
secure program execution
Provided are a central processing unit (CPU) and method for executing a branch instruction of a CPU, which can protect user's data by preventing an error due to...
Method and securing electronic device data processing
A method for securing electronic device processes against attacks (e.g. side channel attacks) during the processing of sensitive and/or confidential data by a...
System for determining allocation of tape drive resources for a secure
data erase process
A system is provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve secure data erase performance...
Computer network with unique identification
A computer network is described in which the data link layer address, e.g., MAC address, of the network cards of client nodes are used to uniquely identify the...
Data processing system using internet protocols
Disclosed are systems employing an architecture that provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through...
A non-relational transactional and analytical database is described. It has a novel data architecture that allows data to persist without requiring any schema...
Noise in secure function evaluation
Systems and methods for injecting noise into secure function evaluation to protect the privacy of the participants and for computing a collective noisy result...
Connection of value networks with information technology infrastructure
and data via applications and support...
A method and a system for relating of a value network analysis of a mission to a knowledge base of dependencies of data objects, applications and information...
Method and system for providing principal protection exposure to equity
Various embodiments of the present invention relate to methods and systems for providing principal protection exposure to equity markets. More particularly, one...
Using accounting data based indexing to create a portfolio of financial
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
System and method for handling data transfers
Systems and methods for managing data transfers between a secure location and a less secure location. A data transfer checker operating on a mobile device...
Secure fingerprint matching by hashing localized information
A method and apparatus for obtaining, hashing, storing and using fingerprint data related to fingerprint minutia including the steps of: a) determining minutia...
Intelligent vehicle access control system
An apparatus for the automatic inspection of a motor vehicle has an identification and psychological profiling zone, an automatic inspection zone and a manual...
Key information consistency checking in encrypting data storage system
A data storage system employs data encryption to increase data security, and techniques for ensuring consistency of key information maintained and used...
System and method for exchanging encryption keys between a mobile device
and a peripheral device
Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a...
Method and apparatus for configuring nodes in a wireless network
Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the...
Shuffle-decrypting legitimacy certifying apparatus and method,
shuffle-decrypting verifying apparatus and...
The present invention is aimed at performing shuffle-decrypting certification which is made more secure by not allowing any knowledge of secret information to...
Method and apparatus for implementing secure clock in device having no
internal power source
A method and apparatus for implementing a secure clock having no internal power source are disclosed. The apparatus accesses a host device having an internal...
Portable data terminal internal support structure
A portable device assembly comprising a first housing portion defining a plurality of a snap retention features, a frame that supports electrical components,...
System for and methods of storing and comparing computer generated
continuous vector lines through a non-secure...
A system/method to store and compare computer generated vector lines through an insecure or a secure communication channel. Using an input device (i.e. computer...
System and method for utilizing a highly secure two-dimensional matrix
code on a mobile communications display
A system and method for utilizing a highly secure two-dimensional matrix code on a mobile communications display includes a mobile communications device having...
Systems for monitoring and controlling usage of materials
Material usage tracking systems for monitoring and optimizing usage of stretch film on a stretch wrapping machine is provided. A system includes a rotary...
Method for managing the security of applications with a security module
A method for managing the security of applications with a security module associated to an equipment connected to a network managed by a control server of an...
Secure streaming container
A system and method for securely streaming encrypted digital media content out of a digital container to a user's media player. This streaming occurs after the...
System, method and computer program product for identifying functions in
computer code that control a behavior...
A security data structure, method and computer program product are provided. In use, computer code is received. Furthermore, functions in the computer code that...
Monitoring computer network security enforcement
Methods and systems are disclosed for monitoring activity of a user on a network component, such as an end user computer, in a virtual private network for...
Methods and apparatus for accessing resources using a multiprocessor in a
A system and method are disclosed which may include entering a secure mode by a processor, whereby the processor may initiate a transfer of information into or...
Methods and systems for providing website hosting security
A method for registering user identification data in an application service provider data repository is provided, where the application service provider...
Generic framework for runtime interception and execution control of
A system and method for controlling execution of an interpreted language. Statements of the interpreted language to be executed by a script engine are...
Methods and apparatus for secure programming and storage of data using a
multiprocessor in a trusted mode
Methods and apparatus provide for: entering a secure mode in which a given processor may initiate a transfer of information into or out of said processor, but...
Secure database access through partial encryption
The present invention generally is directed to systems, methods, and articles of manufacture for securing sensitive information involved in database...
Method and apparatus for flash updates with secure flash
Firmware updates are performed in a digital device that includes a secure flash that secures each block of stored data with a digital signature. In at least one...
Methods and apparatus for secure data processing and transmission
Methods and apparatus provide for placing an apparatus into at least one of a plurality of operational modes, wherein: the apparatus includes a local memory, a...
Method and system for authorizing client devices to receive secured data
A method and system for authorizing client devices to receive secured data streams through the use of digital certificates embedded in the client devices. A...
Method for determining allocation of tape drive resources for a secure
data erase process
A method and computer program product are provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve...
Deep packet scan hacker identification
Securing an accessible computer system typically includes receiving a data packet that includes a payload portion and an attribute portion, where the data...
Remote monitoring of user input devices
A precision data capture recorder/security device non-intrusively and precisely captures and records information from computerized input devices (e.g., computer...
System and method of data security in synchronizing data with a wireless
A system is disclosed. The system includes a server, a client application, and a first database. The first database is associated with the client application....