At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-8,228,898 |
Method and system for distributed call recording A distributed call recording method and system. A recording agent performs recording of a phone call, preparing of the recorded phone call for being... |
US-8,228,895 |
Radio communication device and radio communication system A radio communication device is provided, including a radio control unit for achieving timing synchronization using frames having a fixed period, assigning a... |
US-8,227,859 |
Semiconductor device and method for fabricating the same A semiconductor device includes a step-type recess pattern formed in a substrate, a gate electrode buried in the recess pattern and having a gap disposed... |
US-8,225,409 |
Security control verification and monitoring subsystem for use in a
computer information database system A security control verification and monitoring subsystem of a managed computer system performs security control verification operations regularly and for each... |
US-8,225,407 |
Incident prioritization and adaptive response recommendations Providing adaptive response recommendations for a network security incident comprising at least one underlying security event is disclosed. A first set of data... |
US-8,225,406 |
Systems and methods for using reputation data to detect
shared-object-based security threats Computer-implemented methods and systems for using reputation data to detect shared-object-based security threats are disclosed. In one example, an exemplary... |
US-8,225,395 |
Systems and methods for detecting child identity theft Embodiments of the present invention provide systems and methods for detecting an indication of a suspicious event associated with personal information of a... |
US-8,225,389 |
Method and system to provide physical port security in a digital
communication system A method and system of providing physical port security in a digital data network is disclosed. The system keeps bit maps of allowed physical output ports for... |
US-8,225,384 |
Authentication system for enhancing network security A network-based biometric authentication system includes a client computer (10), a third party server (24), and a biometric authentication server (26). A user... |
US-8,225,381 |
Security technique for controlling access to a network by a wireless
device The present invention relates to a method for protecting the security of a computer network which is accessed through the use of wireless devices, among other... |
US-8,225,371 |
Method and apparatus for creating an information security policy based on
a pre-configured template A method and apparatus for creating a policy based on a pre-configured template is described. In one embodiment, source data having a tabular structure is... |
US-8,225,271 |
Apparatus for control systems with objects that are associated with live
data Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of... |
US-8,225,109 |
Method and apparatus for generating a compressed and encrypted baseline
backup An apparatus and method for securing a baseline backup are disclosed. As part of an incremental backup process, a selected set of file system data, including... |
US-8,225,108 |
Method and system for mixed symmetric and asymmetric encryption of .ZIP
files The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data... |
US-8,225,107 |
Methods of storing and retrieving data in/from external server Provided are methods of storing and searching for data in encrypted form. The method of storing data in encrypted form includes: encrypting desired data from... |
US-8,225,104 |
Data access security An execution environment of a computer computes an initial effective permissions set for managed code based on user identity evidence, code evidence and/or a... |
US-8,225,097 |
Anchor point-based digital content protection Digital content protection can be effectively implemented through use of an anchor point and binding records in a user domain. An anchor point domain may... |
US-8,225,093 |
Providing secure inter-application communication for a mobile operating
environment Providing for secure and efficient communication for mobile applications executed in a mobile operating environment is described herein. As an example, a... |
US-8,225,087 |
System and method for control of security configurations Systems and methods are disclosed for using cryptographic techniques to configure data processing systems. A configuration manager cryptographically controls... |
US-8,225,083 |
Secured seeding of data in a distributed environment Techniques for seeding data among client machines, also referred to as boxes herein, are disclosed. To prevent the data distributed among the boxes from being... |
US-8,225,021 |
Dynamic address change for slave devices on a shared bus A master/slave data communication system in which a master device communicates with the slave devices by uniquely addressing each of the slave devices. In order... |
US-8,224,881 |
System and method for managing welding information A system and method for managing welding information is provided. The invention includes a remote system, a client system and/or a welder. The invention further... |
US-8,224,761 |
System and method for interactive correlation rule design in a network
security system A method for generating correlation rules for events comprises receiving event data for each of a plurality of events, the event data of a particular event... |
US-8,224,738 |
Methods, software, and systems for over-the-counter trading Methods, software, and hardware are disclosed for providing verified real time price quotes in an over-the-counter financial market. Systems are described that... |
US-8,224,725 |
Escrowing digital property in a secure information vault Digital data can be escrowed by receiving escrow parameters including a condition(s) for releasing the escrowed data, and an escrow recipient. An escrow... |
US-8,224,293 |
Encoded colorgram for mobile device security A security system includes a software application running in a user's smartphone and a separately carried visual key that the user can image at will with the... |
US-8,224,248 |
Data security device A backup device comprising a secondary user-carried device for backing up data from a primary portable data storage device is described. The backup device... |
US-8,223,972 |
Method and device for speeding up key use in key management software with
tree structure In the key management software having a key database with a tree structure, a high-speed data encryption/decryption process is achieved by changing the tree... |
US-8,223,969 |
Methods and systems for secure distribution of subscription-based game
software A method for secure communications. At least one encryption key can be generated based on a pass-phrase that associates a unique identifier of a client system... |
US-8,223,801 |
Communications switching architecture Presently described is a system and method for switching multimedia data communications, including but not limited to Voice over IP (VoIP) telephony, cable TV,... |
US-8,223,799 |
Method and system for a digital diary system A wireless communication device may generate an interactive digital diary for one or more users. The device may handle location information, multimedia data,... |
US-8,223,766 |
Communication method for system including client device and plural server
devices An objective of the present invention is to secure the continuity of the communication between a client device and a standby server device, when a failure... |
US-8,223,673 |
Method and system for secure conferencing Methods and systems for secure conferencing in a network have been provided. Relevant endpoints from the provided endpoints are selected on the basis of the... |
US-8,223,599 |
Information recording/reproduction apparatus, information recording method
and information recording medium Provided is a recording/reproduction apparatus capable of securing a backup area for management information on a recording medium without affecting the capacity... |
US-8,223,205 |
Secure implementation of network-based sensors Sensing apparatus includes a network camera, which is configured to capture images of a scene and to output a sequence of data packets containing digitized... |
US-8,223,024 |
Locking mechanism based on unnatural movement of head-mounted display A wearable computer determines unnatural movements of a head-mounted display (HMD) and triggers a locking mechanism. In one embodiment, the wearable computer... |
US-8,223,022 |
Security tag assembly A security tag assembly and security system associated therewith to prevent the unauthorized removal of merchandise from a given area, such as a retail... |
US-8,220,062 |
Double sand-boxing for flash library A Flash advertisement is provided, and access to sensitive data associated with the Flash advertisement is restricted. First library code is stored at a first... |
US-8,220,038 |
Method for securely routing communications A method and program product for securely routing communicating data between sources and destinations having various data protocols. Data protocols are... |
US-8,220,030 |
System and method for security in global computer transactions that enable
reverse-authentication of a server... A system of security for global computer transactions that provides a reverse-authentication authority system that enables a client to authenticate the server... |
US-8,219,998 |
Method and system for load balancing of computing resources A load balancing method incorporates temporarily inactive machines as part of the resources capable of executing tasks during heavy process requests periods to... |
US-8,219,860 |
Microprocessor system for controlling at least partly safety-critical
processes The invention relates to a microprocessor system (60) for controlling and/or regulating at least partly security-critical processes, which system comprises two... |
US-8,219,829 |
Scheme for securing locally generated data with authenticated write
operations A scheme for securing a locally generated data on a system using authenticated write operations is disclosed. According to an embodiment of the present... |
US-8,219,824 |
Storage apparatus, memory card accessing apparatus and method of
reading/writing the same A storage apparatus having a non-volatile memory and a controller is provided, wherein the non-volatile memory includes a root directory area and a data area,... |
US-8,219,821 |
System and method for signature based data container recognition A system and method for signature based data container recognition is provided. When a new data container, such as a lun, is created, a security appliance... |
US-8,219,811 |
Secure software execution such as for use with a cell phone or mobile
device A method and system for securely executing software or securely loading data generates a secret value at a destination device based on a value transmitted to... |
US-8,219,804 |
Approach for managing device usage data Techniques are provided for securely managing, using smart cards, the usage of a peripheral device. In one embodiment, both the peripheral device and the smart... |
US-8,219,799 |
Secure communication system A secure communication system that includes a communication processor, an internet protocol converter that converts data to and from its original protocol to... |
US-8,219,771 |
Portable device for storing private information such as medical, financial
or emergency information A portable housing capable of being carried by a certain person includes a circuit. The circuit includes a memory for storing private data concerning that... |
US-8,219,656 |
System and method for wireless data terminal management using
telecommunication signaling network A method, system, and computer program product that provides the capability to manage, control, and reconfigure wireless devices remotely over a wireless... |