At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure coordinate identification method, system and program
A method, program and system (10) for processing data are disclosed. The method, program and system comprising the steps of: (a) receiving data representing a...
System and method for biometrically secured, transparent encryption and
A computer program for enabling biometrically secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files...
Method and a circuit for SHA operation with power saved
A Secure Hash Algorithm (SHA) operation circuit includes plural storages for storing the variables of the SHA calculation, a permutation section for permuting...
Systems and methods for processing packets for encryption and decryption
A network device for processing data packets includes an encryption services module, a number of network interfaces and a forwarding module. A network interface...
Memory device having secure non-volatile locking functionality
A device and method is provided for maintaining, upon unlocking of a memory, the lock status of the memory prior to the memory being unlocked and recreating the...
Method and system for collecting information from computer systems based
on a trusted relationship
A method and system for retrieving data from devices in a way that seeks to preserve privacy and ensure the integrity of the retrieved data is provided. A...
Patient and device location dependent healthcare information processing
A system automatically establishes context information (e.g., determining changes to user interface workflows, screens, menus, and access requirements for...
Data management apparatus, data management method, data processing method,
Data management security against leakage or loss of personal information is achieved by setting a division range for dividing personal information into...
Method and system for dispensing virtual stamps
A method and system for a virtual stamp dispensing metering system is provided wherein indicia of varying values are calculated at a data center and downloaded...
Method and system for executing trades in a user preferred security
A system for executing trades in a user preferred security comprising a server system (12) in communication with a client system (14), a security data source...
Device for thorough testing of secure electronic components
An apparatus including a test circuit, an output circuit and a control circuit. The test circuit may be configured to generate test data in response to one or...
Secure traffic redirection in a mobile communication system
A method of securely initializing subscriber and security data in a mobile routing system when the subscribers are also subscribers of a radio communication...
Method for forming and distributing a composite file including a dental
image and associated diagnosis
A method of providing dental-related imaging data of a patient to a dental practitioner is provided, the dental-related imaging data being obtained by a third...
XZ-elliptic curve cryptography with secret key embedding
Secure communications over an insecure channel is provided using symmetric key elliptic curve cryptography. More specifically, a shared secret key and/or data...
Multiple virtualized operating environments within a VPN appliance
A secure socket layer virtual private network (SSL VPN) network appliance includes a set of virtual systems having respective context information. Each of the...
Technique for reserving resources for authorized entities in a
A technique for reserving resources in a communication network for an entity. Communication units in the network register with policy data points (PDPs) to...
Multi-tier wireless home mesh network with a secure network discovery
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
Updateable, customizable identification bands are disclosed herein. The identification band may include a band having an opening therein and at least one...
Method for synchronizing frequency-hopping short-range radio devices
A method for synchronizing a security system control panel and a sensor. The control panel and the sensor each have a transceiver. The control panel monitors a...
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
Method and system for random data access for security applications
A method for securely handling processing of information in a chip may include randomly selecting one of a plurality of data processes based on a random process...
Banking system operated responsive to data bearing records
A system for use in banking operates responsive to data in data bearing records. The system is suitable for securing the contents in safety deposit boxes or...
Computational system including mechanisms for tracking propagation of
information with aging
Mechanisms have been developed for securing computational systems against certain forms of attack. In particular, it has been discovered that, by maintaining...
Secure method and system for computer protection
Attacks by computer viruses, worm programs, and other hostile software (`malware`), have become very serious problems for computer systems connected to large...
Method and system for secure communication
A method and system for secure communication is presented. A virtual private proxy is generated based on an agreement between a first entity and a second...
Optical disc drive with latching mechanism that facilitates driving
There is provided an optical disc drive designed for reading data stored in an optical disc. The optical disc drive includes a body, a driving module, a body...
Enhancing security of internal memory
An embodiment of a method of enhancing security of internal memory is disclosed. For this embodiment of the method, the application specific block is operated...
System and method for establishing a shared secret among nodes of a
A system and method securely establishes a shared secret among nodes of a security appliance. The shared secret is established by distributing private keys...
Method and apparatus for multi-level security implementation
A method of operating a multi-level security system including the steps of providing a plurality of processors. At least some of said processors are equipped...
Proactive forced renewal of content protection implementations
A system for proactive forced renewal of content protection implementations in devices includes a key generation facility to generate and allocate keys for the...
Method for securing an electronic certificate
A method is for securing and verifying an electronic certificate issued by an authority to an owner. The certificate is stored in the memory of a user unit...
Protected cache architecture and secure programming paradigm to protect
Embodiments of the present invention provide a secure programming paradigm, and a protected cache that enable a processor to handle secret/private information...
System management and advanced programmable interrupt controller
Methods for processing more securely are disclosed. Embodiments provide effective and efficient mechanisms for reducing APIC interference with accesses to...
Data security system and method adjunct to a browser, telecom or
Data security for processing data or securing browser-input data operates on security sensitive content which is extracted, then either encrypted or stored in...
System and method for multi-level guided node and topology discovery
Systems and methods for user-guided iterative node discovery and topology discovery in a network of nodes involved in secure and reliable data transfer.
Controlling access rights to network resources based on a hierarchical
arrangement of security sets
Mechanisms for securing access to network resources are described. The mechanisms may perform operations for securing access to a network element and which can...
System and method for secure reciprocal exchange of data
A system for transmission of data between a first device operated by a first user and a second device includes a database that receives a first set of data...
Method and apparatus for searching a storage system for confidential data
Method and apparatus for searching a storage system for confidential data is described. One aspect of the invention relates to searching a computer for...
Methods and systems for providing an anti-benchmark portfolio
In one aspect, the invention comprises a method comprising: (a) acquiring data regarding a first group of securities in a first portfolio; (b) based on said...
Voice controlled wireless communication device system
A wireless communication device is disclosed that accepts recorded audio data from an end-user. The audio data can be in the form of a command requesting user...
System and method for utilization of transmitted digital flight data
acquisition information to accomplish...
A system and method is provided for monitoring, collecting, storing, transmitting, calculating and uploading to a secure web server real-time balancing...
System and method for security association between communication devices
within a wireless home network
Embodiments of the application describe a method and system for discovering and authenticating communication devices and establishing a secure communication...
Near field registration of home system audio-video device
A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC...
Cryptographic processing apparatus
An apparatus and a method for performing a hyperelliptic curve cryptography process at a high speed in a highly secure manner are provided. A base point D is...
System, method, and service for dynamically selecting an optimum message
A message pathway selection system dynamically selects an optimum message pathway for transmitting messages. The system dynamically optimizes a message pathway...
Method for changing a group key in a group of network elements in a
The invention relates to a method for changing a group key GK for a secure data exchange in a group of network elements P.sub.1 . . . P.sub.n (n=2, 3, . . . )...
External data processing device to interface with an ambulatory repeater
and method thereof
An external data processing device to interface with an ambulatory repeater and method thereof is presented. An external data processing device is interfaced in...
Secure payment card with static and variable data
In a first aspect of the subject invention, a secure payment card is provided, including: a flat body, the flat body having a patterned channel in proximity to...
Banking system controlled responsive to data bearing records
A banking system operates to cause financial transfers responsive to card data read from data bearing records by a card reader. The system includes at least one...
Computer security intrusion detection system for remote, on-demand users
An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service...