At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System for providing security in a network comprising computerized devices
A system useful within a network and adapted to provide communication security. In one embodiment, the network comprises an untrusted network, and the system...
Portable computerized device adapted for ad hoc security associations
A portable communications device adapted to provide communication security in, for example, an ad hoc or temporary networked environment. In one embodiment, the...
Managed peer-to-peer applications, systems and methods for distributed
data access and storage
Applications, systems and methods for efficiently accessing and controlling data of devices among multiple computers over a network. Peer-to-peer exchanges of...
Systems and methods for extensions and inheritance for units of
information manageable by a hardware/software...
By modeling real-world application objects with complex structures, behaviors, and operations described by a schema which is enforced by the hardware/software...
Linking of personal information management data
A system and method for linking information of one user to other users via a data aggregation server is provided. Various security settings govern the linking of...
Knowledge extraction and abstraction
The present disclosure includes a system and method for learning (or discovering and extracting) business knowledge from a collection of source code. The...
Mail franking system with a secure external printing mode
To print a postal imprint by an external imprint label dispenser connected via a communications link to a postage meter, during an initialization step for...
System for secure mobile healthcare selection
A method, system and device for secure mobile healthcare selection are presented in which a user can, from a mobile device, authorize the comparison of...
Method for directing and executing certified trading interests
Preferred embodiments of the subject invention comprise: (a) electronically receiving securities order-related data regarding a set of securities market...
Open end mutual fund securitization process
A computer implemented system is provided for exchanging shares in an exchange traded product. A display is provided for displaying data representing shares of...
Synchronization and processing of secure information via optically
A method and device enables data communication via optical pulses from a light source of an electronic device. A data transfer interface is provided to support...
Image processing apparatus and image processing control method
An image processing apparatus capable of regulating memory increase to realize cost reduction while securing the degree of freedom in programming by means of a...
Services convergence among heterogeneous wired and wireless networks
A system and method for heterogeneous network communication including wired, and wireless communication mediums for seamless data, voice, as well as multimedia...
Apparatus, method, and program for automatically generating a set of
possible print job workflows and selecting...
An apparatus generates a processing route defining a processing order of plural processing processes to process print data. In the apparatus, a selection unit...
Image processing apparatus for adding different specific images to image
data in color and black-and-white modes
An image processing apparatus for preventing unauthorized uses of image data by allowing the addition of a specific image in a black-and-white mode even when it...
Intelligent luggage tag
An improved system for tracking luggage and other such objects. The system features a transmitter tag for attachment to an object to be tracked and a receiver....
A display unit, attached to a bar forming a handlebar, frame or stem of a bicycle with a securing tool, comprises a body having a display part capable of...
Security document database
A security document database, the database storing security document data including identity data at least partially indicative of an identity of the security...
Recording apparatus that records information for protecting intangible
property right, recording method...
A recording apparatus according to the present invention comprises converting means 15, 18, and 19 and recording means 23, 24, 32, and 33. The converting means...
Methods and systems for providing access control to electronic data
Techniques for providing pervasive security to digital assets are disclosed. According to one aspect of the techniques, a server is configured to provide access...
Secure remote referencing of a networked object of service
A solution for a remote service provider outside a customer's controlled network to reference an object of service (OOS) that is part of the customer's...
Centralized role-based access control for storage servers
Centralized role-based access control (RBAC) for storage servers can include operating multiple storage servers, each configured to provide a set of clients with...
Method and apparatus to enable a securely provisioned computing
A form of removable memory, such as a universal serial bus (USB) flash device, may enable a subscription-based computing system from any PC. The device may...
Method and device for verifying integrity of data acquisition pathways
Disclosed is a method of verifying the integrity of data acquired from a device emulating a hard disk to a host computer over a data transfer pathway. A storage...
Core file transfer
A core file that may be generated when a data storage system encounters a problem can be automatically and securely sent to a remote (e.g., offsite) support...
Method and system for the cipher key controlled exploitation of data
resources, related network and computer...
An arrangement for the cipher controlled exploitation of data resources (e.g., securely storing and retrieving sensitive data or securely registering and logging...
Securing non-volatile data in an embedded memory device
The various embodiments of the invention relate generally to semiconductors and memory technology. More specifically, the various embodiment and examples of the...
Systems and methods for segmenting and protecting a storage subsystem
A storage subsystem comprises a set of zone definitions that uses physical block addresses to divide a memory array in the storage subsystem into zones or...
Secure block read and write protocol for remotely stored files
A file transfer system including a client and a server capable of updating portions of the file stored on the server. The system is capable of uploading portions...
System and method for intelligent data routing
Embodiments of the invention relate to premise, fire, security, or access control systems and their associated communication devices that can receive data...
Network system role determination
The role of a system in a network may be categorized as a networking system, a security system, a systems management system, a mail system, a database system, a...
Managing interworking communications protocols
Systems and methods for managing interworking protocols are provided. According to one embodiment, a policy-based provisioning methodology is used by a service...
100Gbps security and search architecture using programmable intelligent
search memory that uses a power down mode
Memory architecture provides capabilities for high performance content search. The architecture creates an innovative memory that can be programmed with content...
Method and apparatus for data protection
Described is a method for secure data disposal. Data stored in storage volume(s) is encrypted with a specific encryption key. Before the key is disposed of, a...
Just in time delivery of entitlement control message (ECMs) and other
essential data elements for television...
Essential data elements, particularly entitlement control messages (ECMs), are inserted in a manner that reduces the overhead bit rate without effecting overall...
Elliptic curve cryptosystem optimization using two phase key generation
A computer-implemented method of generating an elliptic curve cryptosystem (ECC) signature includes the steps of: generating a first random key (k1) having n...
Mobile computer stand with integrated keyboard
A device for use with a portable computer includes a base, a stand having an upper portion and an adjustable linkage, and a connection mechanism. The base is...
Cloaked data objects in an electronic content management security system
Embodiments of the invention provide for "cloaked" data objects in an electronic content management system. A "cloaked" data object is one that is inaccessible...
Customized data generating data storage system filter for data security
A data storage system filter operates through a filter framework in a file system to detect and provide customized responses to unauthorized access attempts. A...
System and method for internet access to a personal television service
A communication system and a family of methods for remote access to personal television service are disclosed. According to this invention, a remote personal TV...
PMCP extension metadata, data stream generating device, digital data
broadcasting emission system and digital...
Provided are a data server, which is added to a digital broadcast emitting system to emit data broadcasting based on the Programming Metadata Communication...
Multi-threaded business programming library
A business programming library for use by an enterprise resource planning system provides a run-time environment and a library of API services for accessing...
Information processing apparatus with resume function and information
An information processing apparatus having a resume function which can maintain the security even when a plurality of users commonly use the apparatus. A work...
Method for using a compact disk as a smart key device
A data processing method accepts a removable storage media, which becomes electrically engaged with a system unit within the data processing system, after which...
Method and device for controlling access to encrypted data
The invention concerns a method for controlling access to encrypted data by control words (CW), said control words being received by a security module in control...
Dynamic configuration of a gaming system
A method to enable dynamic configuration of gaming terminals installed in one or a plurality of gaming premises whereby certified games, certified data files and...
Routing data to one or more entities in a network
A communications system includes a first network that includes a plurality of entities and a router. The router includes a network address translator. A node is...
Secure sockets layer cut through architecture
An acceleration apparatus is adapted to operate in a direct mode and a proxy mode. In the direct mode, the acceleration apparatus decrypts data packets received...
Method and device for wireless communication between computing devices
A communication device includes a structural, external interface (e.g., a USB interface) for connecting to a computing device, a wireless interface for making a...
Method and apparatus for redirecting data traffic based on external switch
Method for redirecting outbound VLAN traffic away from an inactive external port of a switch. A first switch monitors the active or inactive status of a...