At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure integrated mobile internet protocol transit case
A self-contained wireless internet protocol system includes a power supply converter for receiving input power of any type and converting the input power to a...
Data processing system using internet protocols and RDMA
Disclosed are systems employing an architecture that provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through...
Transmission path quality measuring device, communication system, quality
measurement method, and quality...
A communication quality measuring device includes: a quality measuring unit that measures the communication quality of a transmission path, based on data being...
Method and apparatus for installation and removal of overhead cooling
Disclosed is a data center comprising a first row of equipment racks, a second row of equipment racks, a hot aisle defined by a space between the first row of...
Magnetically preloaded anti-rotation guide for a transducer
A transducer positioning apparatus is provided that supports a read/write head on a data storage machine and biases the head against rotation. The transducer...
System and method for using self-learning rules to enable adaptive
Rules "learn" what is typical or expected for a certain attribute of device data for a given location, premises, time period, etc. Using a rule for a standard...
Security techniques in the RFID framework
The subject invention provides a system and/or a method that facilitates employing a security technique to an RFID network. An interface can receive role-based...
Method and system for providing tracking services to locate an asset
The present invention is directed to a method of asset location. Location data is received from a cellular transmitter associated with a selected asset, which...
Grounding terminal block assembly including conduit adapter for multiple
A grounding terminal block assembly that includes a conduit adapter, a grounding bar, and a detachable cover. The conduit adapter enables attachment to a wall...
IC card secure personalization method
A method for an entity different than a manufacturer of an integrated circuit (IC) card to perform a secure personalization phase of the semi-finished IC card...
Integrated curtain wall and wireway distribution system
A curtain wall including an extruded aluminum sill having a first channel for receiving a glazed panel, a sill anchor/access portion for securing the sill to a...
Architecture for identifying electronic threat patterns
The invention is a comprehensive conceptual and computational architecture that enables monitoring accumulated time-oriented data using knowledge related to the...
Firewall-tolerant voice-over-internet-protocol (VoIP) emulating SSL or
HTTP sessions embedding voice data in...
A voice-over-Internet-Protocol (VoIP) client codes audio data as printable ASCII characters, then embeds the ASCII audio data inside a cookie that is sent over...
Secure resource access
A method, computer readable media, and system for providing a first network resource with secure but limited access to a second network resource. A method...
Authentication protocol for network security services
In one embodiment, an authentication protocol used in a network security service is performed over non-secure connection, such as HTTP. A router subscribing to...
Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
Data processing apparatus in which data is accessed in response to an
access request from a plurality of access...
A data processing apparatus is provided which is capable of improving the responsiveness of communication in which only a maximum of one access request source...
Method and system for securely managing application transactions using
A method and system for secure managing transactions between application devices over a network. The present invention provides a method and system for...
Selective exposure of configuration identification data in virtual
In one embodiment, a computer system comprises a host machine comprising a plurality of compute resources, at least one secure memory location coupled to the...
Communication system for authenticating authority of host device for
accessing storage medium set to periphery...
A search-instruction-data creating unit issues a search request command to a peripheral device, and creates search instruction data including a predetermined...
Transmission of syslog messages over a one-way data link
A special syslog daemon on a send node, wherein the send node is connected to a receive node by a one-way data link, the special syslog daemon configured to...
Community-based method and system for creating and subscribing to dynamic
A system and method are provided for allowing a user to define and subscribe to channels of information to be pushed to a wireless device. In defining a channel...
Presenting evidentiary information
The invention concerns the presentation of evidentiary information on computer generated interfaces within secure user groups. For example presenting evidence a...
Electronic data vault providing biometrically protected electronic
An eVault system securely stores personal data and documents for citizens and allows controlled access by citizens and optionally by service providers. The...
System and method for customer authentication of an item
A system, apparatus and method is provided for authentication of an item or a label by storing unique random serial numbers or codes in a remote secure storage...
Methods and systems for trade cost estimation
In one aspect, the invention comprises: (a) calculating an average bid-ask spread of securities; (b) calculating values associated with one or more markets; (c)...
Analysis, secure access to, and transmission of array images
Systems and methods are provided the autocentering, autofocusing, acquiring, decoding, aligning, analyzing and exchanging among various parties, images, where...
Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
Methods, apparatus, and systems for securing SIM (subscriber identity
module) personalization and other data on...
An electronic circuit 120 includes a more-secure processor (600) having hardware based security (138) for storing data. A less-secure processor (200) eventually...
Method for processing documents containing restricted information
A method, system and computer program product for processing documents containing restricted information. The method for processing the documents includes the...
Protecting a network from unauthorized access
A method and apparatus of protecting a first network from unauthorized access includes storing profile information for each call session, and determining if an...
Image processing system for preventing forgery
Conventionally, it is impossible to securely and efficiently implement the judgment of specific images. In order to solve this task, an image processing...
Apparatus and method for privacy protection of data collection in
A security system which is nonintrusive of personal privacy of a person in a space comprises at least a first localization sensor subsystem, if any, in the...
Integrated circuit and method to secure a RFID tag
A method to secure RFID card information consisting of a piezo electric element coupled to a transistor which is coupled across the antenna leads of a RFID tag,...
Optical data pipe
An optical interconnect system having a first optical sub-system and a second optical sub-system, each optical sub-system having a first end and a second end,...
Method, apparatus, and system for securing data on a removable memory
A method, apparatus, and system for securing data on a removable memory device, which is removably coupled to and accessible by a computing apparatus, are...
Secure magnetic stripe reader
Magnetic stripe readers are disclosed that are configured to extract information from magnetic media and encrypt part of the extracted information. Embodiments...
System and method for controlling secured transaction using directionally
coded account identifiers
A control method and system provides coded access to a system by acquiring account identification data corresponding to a combination of a plurality of symbols....
Differential threat detection processing
Detecting a network security threat is disclosed. Network traffic is classified with a security risk related classification, the classification being determined...
Multi-domain architecture for process isolation with processor supporting
A trusted computer system that offers Linux.RTM. compatibility and supports contemporary hardware speeds. It is designed to require no porting of common...
Information processing apparatus, control method for the apparatus, and
information processing system
Update firmware is stored as one binary file. The binary file includes firmware data necessary for operating a controller unit and root certificate data...
Voice-capable system and method for user-directed network interaction
monitoring for authentication and...
A system and method for use with a voice-capable system, includes but is not limited to a method including receiving a request from a user computationally...
A conversion control unit sets a converting function of a write data conversion unit or a read data conversion unit enabled or disabled for each controller....
Adaptable microcontroller based security monitor
A method is provided for protecting embedded cryptographic processing circuits (112, 114), software and data, contained within electronic equipment. The method...
Network communication security processor and data processing method
The invention provides a network communication security processor and its data processing method, the security processor comprising: a data communication...
Secure identification with biometric data
A secure method and device of identification by biometric data in which digital biometric data obtained by a sensor are combined with an identifier of an...
Communication mediating apparatus for mediating communication over network
A mediation server 200 mediates a print demand from a client device 100 to a printing device 300. In order to elude a firewall F/W set between the mediation...
A processing apparatus includes an execution stage which executes each of instruction streams, a first resource counter which counts the number of operating...
Identifying, storing, and retrieving context data for a network message
A system and method for storing context data in a network device that is in the data path between a user computer and a server, thereby allowing for the secure...
Support vector machine using iterative chunking and violators
An implementation of SVM functionality improves efficiency, time consumption, and data security, reduces the parameter tuning challenges presented to the...