At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Architecture for identifying electronic threat patterns
The invention is a comprehensive conceptual and computational architecture that enables monitoring accumulated time-oriented data using knowledge related to the...
Firewall-tolerant voice-over-internet-protocol (VoIP) emulating SSL or
HTTP sessions embedding voice data in...
A voice-over-Internet-Protocol (VoIP) client codes audio data as printable ASCII characters, then embeds the ASCII audio data inside a cookie that is sent over...
Secure resource access
A method, computer readable media, and system for providing a first network resource with secure but limited access to a second network resource. A method...
Authentication protocol for network security services
In one embodiment, an authentication protocol used in a network security service is performed over non-secure connection, such as HTTP. A router subscribing to...
Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
Data processing apparatus in which data is accessed in response to an
access request from a plurality of access...
A data processing apparatus is provided which is capable of improving the responsiveness of communication in which only a maximum of one access request source...
Method and system for securely managing application transactions using
A method and system for secure managing transactions between application devices over a network. The present invention provides a method and system for...
Selective exposure of configuration identification data in virtual
In one embodiment, a computer system comprises a host machine comprising a plurality of compute resources, at least one secure memory location coupled to the...
Communication system for authenticating authority of host device for
accessing storage medium set to periphery...
A search-instruction-data creating unit issues a search request command to a peripheral device, and creates search instruction data including a predetermined...
Transmission of syslog messages over a one-way data link
A special syslog daemon on a send node, wherein the send node is connected to a receive node by a one-way data link, the special syslog daemon configured to...
Community-based method and system for creating and subscribing to dynamic
A system and method are provided for allowing a user to define and subscribe to channels of information to be pushed to a wireless device. In defining a channel...
Presenting evidentiary information
The invention concerns the presentation of evidentiary information on computer generated interfaces within secure user groups. For example presenting evidence a...
Electronic data vault providing biometrically protected electronic
An eVault system securely stores personal data and documents for citizens and allows controlled access by citizens and optionally by service providers. The...
System and method for customer authentication of an item
A system, apparatus and method is provided for authentication of an item or a label by storing unique random serial numbers or codes in a remote secure storage...
Methods and systems for trade cost estimation
In one aspect, the invention comprises: (a) calculating an average bid-ask spread of securities; (b) calculating values associated with one or more markets; (c)...
Analysis, secure access to, and transmission of array images
Systems and methods are provided the autocentering, autofocusing, acquiring, decoding, aligning, analyzing and exchanging among various parties, images, where...
Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
Methods, apparatus, and systems for securing SIM (subscriber identity
module) personalization and other data on...
An electronic circuit 120 includes a more-secure processor (600) having hardware based security (138) for storing data. A less-secure processor (200) eventually...
Method for processing documents containing restricted information
A method, system and computer program product for processing documents containing restricted information. The method for processing the documents includes the...
Protecting a network from unauthorized access
A method and apparatus of protecting a first network from unauthorized access includes storing profile information for each call session, and determining if an...
Image processing system for preventing forgery
Conventionally, it is impossible to securely and efficiently implement the judgment of specific images. In order to solve this task, an image processing...
Apparatus and method for privacy protection of data collection in
A security system which is nonintrusive of personal privacy of a person in a space comprises at least a first localization sensor subsystem, if any, in the...
Integrated circuit and method to secure a RFID tag
A method to secure RFID card information consisting of a piezo electric element coupled to a transistor which is coupled across the antenna leads of a RFID tag,...
Optical data pipe
An optical interconnect system having a first optical sub-system and a second optical sub-system, each optical sub-system having a first end and a second end,...
Method, apparatus, and system for securing data on a removable memory
A method, apparatus, and system for securing data on a removable memory device, which is removably coupled to and accessible by a computing apparatus, are...
Secure magnetic stripe reader
Magnetic stripe readers are disclosed that are configured to extract information from magnetic media and encrypt part of the extracted information. Embodiments...
System and method for controlling secured transaction using directionally
coded account identifiers
A control method and system provides coded access to a system by acquiring account identification data corresponding to a combination of a plurality of symbols....
Differential threat detection processing
Detecting a network security threat is disclosed. Network traffic is classified with a security risk related classification, the classification being determined...
Multi-domain architecture for process isolation with processor supporting
A trusted computer system that offers Linux.RTM. compatibility and supports contemporary hardware speeds. It is designed to require no porting of common...
Information processing apparatus, control method for the apparatus, and
information processing system
Update firmware is stored as one binary file. The binary file includes firmware data necessary for operating a controller unit and root certificate data...
Voice-capable system and method for user-directed network interaction
monitoring for authentication and...
A system and method for use with a voice-capable system, includes but is not limited to a method including receiving a request from a user computationally...
A conversion control unit sets a converting function of a write data conversion unit or a read data conversion unit enabled or disabled for each controller....
Adaptable microcontroller based security monitor
A method is provided for protecting embedded cryptographic processing circuits (112, 114), software and data, contained within electronic equipment. The method...
Network communication security processor and data processing method
The invention provides a network communication security processor and its data processing method, the security processor comprising: a data communication...
Secure identification with biometric data
A secure method and device of identification by biometric data in which digital biometric data obtained by a sensor are combined with an identifier of an...
Communication mediating apparatus for mediating communication over network
A mediation server 200 mediates a print demand from a client device 100 to a printing device 300. In order to elude a firewall F/W set between the mediation...
A processing apparatus includes an execution stage which executes each of instruction streams, a first resource counter which counts the number of operating...
Identifying, storing, and retrieving context data for a network message
A system and method for storing context data in a network device that is in the data path between a user computer and a server, thereby allowing for the secure...
Support vector machine using iterative chunking and violators
An implementation of SVM functionality improves efficiency, time consumption, and data security, reduces the parameter tuning challenges presented to the...
Music content using apparatus
An apparatus is designed for using a music content composed of at least one content material in accordance with security information of the music content. In...
Mobile phone accessing system and related storage device
The present invention provides a mobile phone accessing system. The mobile phone accessing system comprises: a mobile phone having a first International Mobile...
Image forming apparatus
An image forming apparatus includes an image inputting section through which image information containing object information and secure object information is...
Data processing method suitable for system including image processing
apparatus, system including image...
There is provided an image processing apparatus which is capable of maintaining high data security and provide high convenience and high security. When a print...
System, method and computer program for ensuring secure use of music
playing data files
A system, apparatus, or method extracts a music playing data file from a given musical work resource such as an electronic music score data file, a printed...
Secure progressive controller
A method and system for configuring a progressive system that insures enhanced operative control and security of the progressive system. The progressive...
Recording medium processing apparatus
The apparatus has a carriage that holds a head, a carriage-driving mechanism having a motor, and a holding mechanism configured to press a recording medium to a...
Managed peer-to-peer applications, systems and methods for distributed
data access and storage
Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless,...
Method and system for load balancing of computing resources
A load balancing method incorporates temporarily inactive machines as part of the resources capable of executing tasks during heavy process requests periods to...
Device and method for generating digital signatures
For the secure creation of digital signatures and/or for the secure authentication of users with a chip card, an apparatus is plugged into a computer and the...
Method, system and apparatus to support mobile IP version 6 services
For establishing a MIPv6 security association between the mobile node (10) roaming in a foreign network (20) and a home agent (36) and for simplifying...