At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Gurney clamp, detachable equipment stand and associated transport cart
A Gurney Clamp, Detachable Equipment Stand and Associated Transport Cart is disclosed. The combination of these devices makes the transportation of patients and...
Reader with integrated encryption unit
The invention concerns a device for reading and encrypting sensitive data which are to be transmitted by way of a remote transmission network (7) to a central...
Self-protecting digital content
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic...
In order to protect the user security data, provided is a memory card capable of preventing the data leakage to a third party not having the access authority by...
Techniques for detecting and preventing unintentional disclosures of
Protection is provided to prevent a computer user from unintentionally giving away sensitive data (e.g., security credentials, credit card number, PINs,...
System for regulating host security configuration
Methods and apparatus for dynamically revising host-intrusion-protection configurations according to varying host state and changing intrusion patterns are...
Security of a network system
In a first aspect, a first method of improving security of a network system is provided. The first method includes the steps of (1) providing a plurality of...
Method and arrangement for server-controlled security management of
services to be performed by an electronic...
An arrangement for providing data in the context of security management for a franking system has a remote data center at which a list of data sets is stored...
Centralized identity management for delegating resource management in a
technology outsourcing environment
Delegating resource management to customers in a technology outsourcing environment includes providing the customer with a secured user interface (e.g., HTML...
Apparatus and method of mirroring firmware and data of embedded system
Disclosed is an apparatus and method of mirroring firmware and data of an embedded system. The embedded system mirrors a boot loader image, a kernel image, a...
Secure data log management
In one embodiment a secure computer system comprises a processor and a memory module including logic instructions stored on a computer readable medium which....
System and method for performing a trust-preserving migration of data
objects from a source to a target
A data migration system performs a tamper-resistant data migration for regulatory compliance systems. The system generates a secure hash for the data object,...
System, method and computer product for sending encrypted messages to
recipients where the sender does not...
A system for encrypting and decrypting messages using a browser in either a web or wireless device or secure message client software for transmission to or from...
Classification engine in a cryptography acceleration chip
Provided is an architecture for a cryptography accelerator chip that allows significant performance improvements over previous prior art designs. In various...
Distributed system and computer program product for establishing security
in a publish/subscribe data...
A technique for establishing security in a publish/subscribe data processing broker network is presented. The technique includes providing a security extension...
Electronic device using memory to expand storage capacity
The present invention discloses an electronic device using a memory to expand storage capacity, and the device includes a main board and a data storage module....
System for coordinating registration and managing peer-to-peer connections
for data replicated backup and...
Techniques are presented for peer-to-peer (P2P) replicated backup and versioning. Peer clients register and share storage with one another for purposes of P2P...
Agile network protocol for secure communications with assured system
A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field....
Image processing apparatus, image processing system, and control method
This invention uses a storage device more effectively than ever before to store image data in a predetermined storage device for future security chasing. A...
100GBPS security and search architecture using programmable intelligent
search memory (PRISM) that comprises...
Memory architecture provides capabilities for high performance content search. The architecture creates an innovative memory that can be programmed with content...
System and method for securing data through a PDA portal
Consumers may utilize computing devices to assist in the purchase and/or loyalty process, and in particular, the consumer may utilize a PDA to facilitate the...
Network security modeling system and method
A network security modeling system which simulates a network and analyzes security vulnerabilities of the network. The system includes a simulator which...
Enhanced information security system
An improved security system for monitoring passengers aboard vehicles in real time uses existing off-the-shelf computer technology and an associated GPS system...
Method for ensuring data transmission security, communication system and
The invention relates to a method for ensuring data transmission security between a first and a second communication device in short-range wireless ...
Method for management of access means to conditional access data
A method for management of access means to conditional access data may include: initiating, from a security module of a multimedia unit, a verification of the...
Recordation of encrypted data to a recordable medium
Systems and methods of recording data are disclosed herein. A secure storage area is received from a host device. The secure storage area is indicative of a...
Monitoring receiver having virtual receiver and line numbers
A virtual receiver having multiple communication ports for connecting a link to a plurality of local security systems. The virtual receiver is programmed with a...
Microprocessor controlled security tag
A microprocessor controlled security tag and accompanying security system is described. The tag generally includes a housing having external contacts to...
Portable access device
Portable devices, methods, and systems for controlling access to computers and other secure systems such as systems protecting secure premises, by processing...
Method for making a secure personal card and its working process
A method for producing a secure personal card and its working process using an intelligent card, the card has electric contacts, a CPU with at least data memory...
Techniques for managing fraud information
Techniques are presented for managing fraud information. Metadata defines user profiles, security levels, fraud cases, and presentation information. One or more...
Automated banking machine with nonconctact reading of card data
An automated banking machine can receive user card data from a cell phone. The phone stores the card data of several selectable cards, including electronic...
Method and system for deterring product counterfeiting, diversion and
piracy on a single system
A method and system for authenticating goods and thereby detecting and deterring counterfeits are disclosed. According to one aspect of the invention, a client...
Mobile terminal and gateway for remotely controlling data transfer from
A data transfer system including mobile terminals and gateways for transferring data from a secure network to an external network under remote control using the...
Method and device for authorising conditional access
A method of authorising conditional access to an encrypted digital data product, includes storing at least one set of entitlements in a secure device, each...
Secure data exchange technique
Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the...
Bilateral communication using multiple one-way data links
A bilateral data transfer system comprising a first node, a second node, a first one-way link for unidirectional transfer of first data from the first node to...
Method and apparatus to secure AAA protocol messages
A method and an apparatus are disclosed for securing authentication, authorization and accounting (AAA) protocol messages. An encryption key, a device...
Document access control system, data processing apparatus, program product
and method for performing document...
A document access control system for determining whether to allow a client to access a target document file according to a security policy set in a server, the...
Document management apparatus, document management method, document
management program, and storage medium
A document management apparatus that communicates with a server and manages confidentiality of electronic data generated by a confidentiality preservation...
Secure database access through partial encryption
The present invention generally is directed to systems, methods, and articles of manufacture for securing sensitive information involved in database...
Systems and methods of securing resources through passwords
Disclosed is a method of authorizing access to an item that maintains a lockout count and blocks access to the item if the lockout count exceeds a predetermined...
Data depository and associated methodology providing secure access
pursuant to compliance standard conformity
A secure data depository assembly, and an associated method, provides for storage of data at a secured location forming a vault. Data associated with any of...
Preventing execution of software without a dynamically generated key
A method, system and computer program product for partitioning the binary image of a software program, and partially removing code bits to create an encrypted...
Block-based media content authentication
A technique for security and authentication on block-based media includes involves the use of protected keys, providing authentication and encryption...
Method for securing an authentication and key agreement protocol
An authentication method including operation of a personal token, a personal token for a terminal in a communication network, an authentication server, and a...
Memory module, memory system, and information device
A memory system including ROM and RAM in which reading and writing are enabled. A memory system includes a non-volatile memory (FLASH), DRAM, a control circuit,...
Method for assembling and shipping an item in a secure environment
A method for assembling and shipping an item using a security cleared space connected to a port authority, comprising the steps of: leasing the security cleared...
System and method for automatic security authentication in wireless
A system for automatic security authentication in a wireless network includes a server and a terminal. The terminal includes a processor, a first communications...
Negotiated secure fast table lookups for protocols with bidirectional
During connection establishments for a protocol with bidirectional identifiers, connection data is allocated, the locally selected identifier is a pointer to...