At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System for securing inbound and outbound data packet flow in a computer
A method provides for control of access to network resources. A virtual identity machine resides in the network and is pre-authorized to access certain network...
System and method for limiting exposure of hardware failure information
for a secured execution environment
A method and apparatus for limiting the exposure of hardware failure information is described. In one embodiment, an error reporting system of a processor may...
Methods used in a secure yet flexible system architecture for secure
devices with flash mass storage memory
A device with mass storage capability that uses a readily available non secure memory for the mass storage but has firmware (and hardware) that provides...
The invention provides an external in-line device ("Subnet Box") placed between a network and an access point to achieve secure Wi-Fi communications without...
Agile network protocol for secure communications with assured system
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a...
Method for secure communication over a public data network via a terminal
that is accessible to multiple users
There is described a method of communicating over a public data network, for example the Internet. A user of a public PC, for example one located in an Internet...
Method, system, and computer program product for managing controlled
residential or non-residential environments
A control server, or similar central processor, manages the distribution of data (including audio and video), voice, and control signals among a plurality of...
Electronic signature security system
One embodiment of the invention enhances the security of electronic signatures during transmission. A peripheral device, which may be located remotely and...
Disabling operation of features on a handheld mobile communication device
based upon location
Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical...
Security in a mobile communications system
When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network...
Secure data distribution
Data encrypted with a scrambling key Ks are transmitted from a service provider via a master device to a plurality of client devices having unique identifiers,...
Information processing apparatus and method for inhibiting printing of
Generation/non-generation of print data for a printer driver is controlled in correspondence with an external print policy for a document to be printed. The...
Mobile data logging systems and methods
We have disclosed a modular personal network (MPN) that includes multiple devices that may be worn, carried, or used in close proximity to a user. The devices...
Computerized card production equipment
An apparatus and method for manipulating images is disclosed. In one embodiment according to the invention, a method for manipulating images comprises:...
Multi-level cryptographic transformations for securing digital assets
Enhanced multi-level cryptographic transformations that secure electronic files are disclosed. The secured electronic files contain not only secured data but...
System and method for ensuring security of data stored on electronic
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device...
Method to trickle and repair resources scanned using anti-virus
technologies on a security gateway
In one embodiment, a trickle and repair application receives data from a sending computer system and trickles the data to a target computer system over an...
Method and apparatus for detecting anomalous network activities
A method and apparatus for detecting an anomalous activity in a communications network is described. In one example, short-term event data is received from a...
Network security system and method
A network security system and method for reacting to unauthorized data access in an inner data system by combining a redirect system is described. The examples...
Multiple-level data processing system
Methods and systems for processing multiple levels of data in system security approaches are disclosed. In one embodiment, a first set and a second set of...
Electronic circuit comprising a test mode secured by insertion of decoy
data in the test chain, associated method
An electronic circuit includes configurable cells each having a test input and an output. The configurable cells are connected to one another in a chain in a...
Method and apparatus for providing intelligent error messaging
A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive...
Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
Security in peer to peer synchronization applications
The claimed subject matter provides a system and/or a method that facilitates synchronizing data within a data storage system. An interface component can...
Methods and systems for providing improved security when using a uniform
resource locator (URL) or other...
Methods and systems for improving security when accessing a URL, such as a Web site. In one exemplary method, a user is warned if a previously unvisited Web...
Security system for and method of detecting and responding to cyber
attacks on large network systems
An improved security system for and method of detecting and responding to cyber attacks on a network or network element. The system comprises: (a) an...
Automated actions based on restrictions
A technique for resolving a violation of an investment account restriction is provided. The restriction is associated with the holding of one or more securities...
Apparatus and method for controlling a wave field synthesis renderer means
with audio objects
An apparatus for controlling a wave field synthesis renderer with audio objects includes a provider for providing a scene description, wherein the scene...
Encryption key restoring method, information processing apparatus, and
encryption key restoring program
A disclosed encryption key restoring method enables restoration of an encryption key in the event of inability to use the encryption key stored in a secure...
Secure data transmission via multichannel entitlement management and
A method for communicating data, such as audio/video (AV) data, over plural channels involves selecting data and encryption information, and encrypting the data...
Printing system and printer with electronic signature capability and
A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic...
Packet transmitting apparatus
A packet transmitting apparatus for transmitting a content protected with a content protection technique such as DTCP in the form of packets which are widely...
System and method to support networking functions for mobile hosts that
access multiple networks
An IP-based corporate network architecture and method for providing seamless secure mobile networking across office WLAN, home WLAN, public WLAN, and 2.5 G/3 G...
Home base tranceiver station apparatus using packet network in a mobile
communication system and method thereof
A system using a packet network in a mobile communication system is provided, in which a home BTS provides a mobile communication service to an MS using a...
Magnetic head inspection system, magnetic head inspection method and
magnetic disk drive manufacturing method
Embodiments of the present invention provide a magnetic head inspection system having a simple configuration capable of inspecting magnetic heads. According to...
System and method for importing location information and policies as part
of a rich presence environment
A system and method are described herein that includes a presence server which is capable of notifying a watcher about a location of a person using a rich...
Testing software applications with schema-based fuzzing
Systems and methods to test software applications with schema-based fuzzing are described. In one aspect, the systems and methods automatically generate valid...
Secure channel reservation
A beacon method for use in a wireless communication network involves populating a beacon frame's channel identification data with accurate data associated with...
Internet security news network
A system and method are disclosed for collecting, analyzing, verifying, producing, and broadcasting security data. Internet security-related information may be...
System and method for secure configuration of sensitive web services
The present invention discloses a system and method for configuration of access rights to sensitive information handled by a sensitive Web-Service. In a case of...
Separate secure networks over a non-secure network
Systems and methods for creating and operating separate secure networks over a non-secure network are described herein. Some illustrative embodiments include a...
Process and adaptive and progressive system for the secured distribution
of fixed pictures coded in wavelets
A process for secured distribution of digital fixed pictures in the form of streams comprising sequences of data each containing a part of information of the...
Systems and methods using cryptography to protect secure computing
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and...
Modifications to increase computer system security
Methods and systems for processing more securely. More specifically, embodiments provide effective and efficient mechanisms for reducing APIC interference with...
Method for visual structuring of multivariable data
A system for visual structuring of multivariable data sets includes a plurality of sensors for monitoring data and generating events depending on the...
Installing a solution
Tool(s) enabling installation of a solution are described. These tool(s) may follow appropriate security precautions to contain possibly dangerous code in a...
Computer program product for implementing investment company that issues a
class of conventional shares and a...
A computer program product is provided for administering a single investment company. The computer program product has a computer-readable medium encoded with...
System and method for trading fixed income financial instruments
A system for automated trading of U.S. Treasury, Liquid Agency, and Zero Coupon STRIP financial instruments comprises an updatable system database; an updatable...
Table driven accounting method and system
The described embodiments of the invention include a method for maintaining accounting records for a portfolio of investments, comprising accounting records...
Methods and systems for risk management
In one aspect, the invention comprises acquiring background data regarding securities positions and regarding real-time pricing data; performing calculations...