At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and securing electronic device data processing
A method for securing electronic device processes against attacks (e.g. side channel attacks) during the processing of sensitive and/or confidential data by a...
System for determining allocation of tape drive resources for a secure
data erase process
A system is provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve secure data erase performance...
Computer network with unique identification
A computer network is described in which the data link layer address, e.g., MAC address, of the network cards of client nodes are used to uniquely identify the...
Data processing system using internet protocols
Disclosed are systems employing an architecture that provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through...
A non-relational transactional and analytical database is described. It has a novel data architecture that allows data to persist without requiring any schema...
Noise in secure function evaluation
Systems and methods for injecting noise into secure function evaluation to protect the privacy of the participants and for computing a collective noisy result...
Connection of value networks with information technology infrastructure
and data via applications and support...
A method and a system for relating of a value network analysis of a mission to a knowledge base of dependencies of data objects, applications and information...
Method and system for providing principal protection exposure to equity
Various embodiments of the present invention relate to methods and systems for providing principal protection exposure to equity markets. More particularly, one...
Using accounting data based indexing to create a portfolio of financial
A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index...
System and method for handling data transfers
Systems and methods for managing data transfers between a secure location and a less secure location. A data transfer checker operating on a mobile device...
Secure fingerprint matching by hashing localized information
A method and apparatus for obtaining, hashing, storing and using fingerprint data related to fingerprint minutia including the steps of: a) determining minutia...
Intelligent vehicle access control system
An apparatus for the automatic inspection of a motor vehicle has an identification and psychological profiling zone, an automatic inspection zone and a manual...
Key information consistency checking in encrypting data storage system
A data storage system employs data encryption to increase data security, and techniques for ensuring consistency of key information maintained and used...
System and method for exchanging encryption keys between a mobile device
and a peripheral device
Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a...
Method and apparatus for configuring nodes in a wireless network
Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the...
Shuffle-decrypting legitimacy certifying apparatus and method,
shuffle-decrypting verifying apparatus and...
The present invention is aimed at performing shuffle-decrypting certification which is made more secure by not allowing any knowledge of secret information to...
Method and apparatus for implementing secure clock in device having no
internal power source
A method and apparatus for implementing a secure clock having no internal power source are disclosed. The apparatus accesses a host device having an internal...
Portable data terminal internal support structure
A portable device assembly comprising a first housing portion defining a plurality of a snap retention features, a frame that supports electrical components,...
System for and methods of storing and comparing computer generated
continuous vector lines through a non-secure...
A system/method to store and compare computer generated vector lines through an insecure or a secure communication channel. Using an input device (i.e. computer...
System and method for utilizing a highly secure two-dimensional matrix
code on a mobile communications display
A system and method for utilizing a highly secure two-dimensional matrix code on a mobile communications display includes a mobile communications device having...
Systems for monitoring and controlling usage of materials
Material usage tracking systems for monitoring and optimizing usage of stretch film on a stretch wrapping machine is provided. A system includes a rotary...
Method for managing the security of applications with a security module
A method for managing the security of applications with a security module associated to an equipment connected to a network managed by a control server of an...
Secure streaming container
A system and method for securely streaming encrypted digital media content out of a digital container to a user's media player. This streaming occurs after the...
System, method and computer program product for identifying functions in
computer code that control a behavior...
A security data structure, method and computer program product are provided. In use, computer code is received. Furthermore, functions in the computer code that...
Monitoring computer network security enforcement
Methods and systems are disclosed for monitoring activity of a user on a network component, such as an end user computer, in a virtual private network for...
Methods and apparatus for accessing resources using a multiprocessor in a
A system and method are disclosed which may include entering a secure mode by a processor, whereby the processor may initiate a transfer of information into or...
Methods and systems for providing website hosting security
A method for registering user identification data in an application service provider data repository is provided, where the application service provider...
Generic framework for runtime interception and execution control of
A system and method for controlling execution of an interpreted language. Statements of the interpreted language to be executed by a script engine are...
Methods and apparatus for secure programming and storage of data using a
multiprocessor in a trusted mode
Methods and apparatus provide for: entering a secure mode in which a given processor may initiate a transfer of information into or out of said processor, but...
Secure database access through partial encryption
The present invention generally is directed to systems, methods, and articles of manufacture for securing sensitive information involved in database...
Method and apparatus for flash updates with secure flash
Firmware updates are performed in a digital device that includes a secure flash that secures each block of stored data with a digital signature. In at least one...
Methods and apparatus for secure data processing and transmission
Methods and apparatus provide for placing an apparatus into at least one of a plurality of operational modes, wherein: the apparatus includes a local memory, a...
Method and system for authorizing client devices to receive secured data
A method and system for authorizing client devices to receive secured data streams through the use of digital certificates embedded in the client devices. A...
Method for determining allocation of tape drive resources for a secure
data erase process
A method and computer program product are provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve...
Deep packet scan hacker identification
Securing an accessible computer system typically includes receiving a data packet that includes a payload portion and an attribute portion, where the data...
Remote monitoring of user input devices
A precision data capture recorder/security device non-intrusively and precisely captures and records information from computerized input devices (e.g., computer...
System and method of data security in synchronizing data with a wireless
A system is disclosed. The system includes a server, a client application, and a first database. The first database is associated with the client application....
System and method for generating an unpredictable number using a seeded
A random number generating algorithm is seeded with an unpredictable number. The seed value is computed by subjecting variable data to a Secure Hashing...
Managing access to and updating warehouse data
Methods, systems, and computer program products manage access to and update warehouse data associated with one or multiple online data systems. A security role...
System and method for enabling product development
A comprehensive platform for developing digital products. A standardized process is applied to a product development effort and an online portal provides tools...
Information-communication terminal device and automatic backup system
including the same
An information-communication terminal device maintaining a low cost of a charger in the case of backup for the device at a charging time, having a high...
Portable memory storage device with biometric identification security
A portable memory storage device is disclosed where access to information on the device is granted only upon proper biometric authentication of a user. The...
Data security system and method for high bandwidth bus
A data security system for a high bandwidth bus comprises a circular shift register operable to load a variable key value, and a scrambler coupled to the...
Method and apparatus for generating cryptographic sets of instructions
automatically and code generator
The method according to this invention concerns a method for automatically generating cryptographic algorithms with optional supplementary data, said algorithms...
Method and system for secure data aggregation in wireless sensor networks
A method for transmitting sensed data in a wireless sensor network including multiple sensors and a database, the method includes: automatically dividing the...
Data parallelized encryption and integrity checking method and device
A method and device for encrypting and/or decrypting binary data blocks protecting both confidentiality and integrity of data sent to or received from a memory....
Methods and improvements for joining wireless mesh networks
Method and improvements for joining wireless mesh networks are provided. In one embodiment, a controller in each network receives a message from a node in its...
Voice, lip-reading, face and emotion stress analysis, fuzzy logic
intelligent camera system
Revealed is an intelligent camera security monitoring, fuzzy logic analyses and information reporting system that includes video/audio camera, integrated local...
Audio-video tip analysis, storage, and alerting system for safety,
security, and business productivity
An audio surveillance, storage, and alerting system, including the following components: One or more audio sensory devices capture audio data having attribute...
Viewing angle controllable liquid crystal display device and driving
A viewing angle controllable liquid crystal display device, as embodied, includes: a liquid crystal panel including a plurality of color pixels, each of the...