At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Assembly comprising a tachograph
An assembly has a tachograph and a data memory, in particular a data memory of a data card. The tachograph has an interface designed to exchange data between the...
Techniques for securely accelerating external domains locally
Techniques are provided for securely accelerating external domains locally. Secure client requests directed to an external domain are forwarded to a local domain...
Methods and systems for secure user authentication
Methods and systems for secure user authentication utilizes OTP generation and validation techniques in which the shared secret for generating the OTP is not...
System and method for providing security for a wireless network
A system and method for providing secure communication between nodes (102, 106, 107) in a wireless multihopping communication network (100). The system and...
Management of multiple network devices using unsigned java applets
Remote management of a plurality of network devices is described wherein each device is managed with its own unsigned Java.TM. applet. Unsigned applets launched...
Microprocessor comprising signature means for detecting an attack by error
A method for monitoring the execution of a sequence of instruction codes in an integrated circuit comprising a central processing unit provided for executing...
System for providing a trustworthy user interface
The preferred embodiment of the invention comprises a computer system which employs a trusted display processor (260), which has a trusted processor (300) and...
Translation device, translation method, and storage medium
A translation device has an input unit that inputs image data from a document; a detecting unit that detects a security information image, which indicates that...
Method and apparatus for enhancing security of wireless communications
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data...
Systems and methods using cryptography to protect secure computing
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and...
Data security for use with a file system
An embodiment of the invention provides an apparatus and method for providing data security for use with a file system. The apparatus and method performs acts...
Method for remote access of vehicle components
Vehicle internetworks provide for communications among diverse electronic devices within a vehicle, and for communications among these devices and networks...
System for providing security in a network comprising communications
A system for providing communications security and authentication to a plurality of computerized devices is disclosed. In one embodiment, the system is useful...
Method and system for remote management of customer servers
Embodiments of the invention are directed generally to a decentralization of security provisions, improved logging of textual and/or graphical data in the...
Detection of network security breaches based on analysis of network record
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record,...
Network-extensible reconfigurable media appliance
Extensible reconfigurable media appliance for security and entertainment captures images digitally for storage. Digital effects and filters are applied to...
Security monitoring tool for computer network
A security monitoring tool and method for a computer network receives data and determines whether the data is associated with a host already stored in a...
Database access security
Apparatus for protection of database objects from unwanted access, particularly from external connections via a firewall (20). The apparatus comprises a data...
Method and system for initiating pairs trading across multiple markets
having automatic foreign exchange price...
Methods and systems for initiating trading, and more particularly, to pairs trading across multiple exchanges by allowing a trader to monitor, trade, and hedge...
Display device and funds transaction device including the display device
A display device is disclosed which may be used in a mobile telephone or other article which is intended to make secure transactions such as financial...
Internet appliance system and method
An Internet appliance, comprising, within a single housing, packet data network interfaces, adapted for communicating with the Internet and a local area network,...
Method for using an electronic lock box with a biometric identification
An improved electronic lock box system is provided for more secure control over the accessibility of a secure compartment in the electronic lock box, which is...
Enhancing the security of public key cryptosystem implementations
In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase to populate a data structure. Then, a...
Service for NAT traversal using IPSEC
Disclosed are methods and apparatus for methods and apparatus for facilitating a secure connection between a first and a second node in a computer network where...
Home network system
The present invention discloses a home network using a living network control protocol. The home network system includes: a network based on a predetermined...
Automatic brewster angle refractometer
An improved refractometer for automatically determining the refractive index of a test subject by using principles embodied in Brewster's Angle, the...
System and method of detecting communication device having built-in camera
Provided are a communication device having a built-in camera and a system and method of detecting a communication device having a built-in camera. In the system,...
Information display apparatus and navigation apparatus
In an information display apparatus such as a head-up display, while safety is being secured, visibility from a user is improved. Image data having an object...
Automated game monitoring
The present invention provides a system and method for monitoring players in a game, extracting player and game operator data, and processing the data. In one...
Protection system and method
.[.An anti-virus.]. .Iadd.A .Iaddend.protection system and method for use within a data transmission network to protect against the transfer of viruses from a...
Method and/or system to authorize access to stored data
Embodiments of methods and/or systems to authorize access to stored data are disclosed herein. When a data access request is detected by an agent executing on a...
Security management method and apparatus, and security management program
According to the present invention, a security management program which is recorded in a computer readable recording medium and is used to control access to...
File access authorization management apparatus and method
In an information processing apparatus which divides a memory area into a plurality of boxes and manages data stored in each box, security information containing...
Method of providing secure groups using a combination of group and
A key selection process is provided which secures traffic between VPN end-points using a combination of SVPN group keys and pair-wise keys. The type of key used...
Method, system and software for maintaining network access and security
A system, method and apparatus for securing communications between a trusted network and an untrusted network are disclosed. A perimeter client is deployed...
Method and apparatus for data transfer across a network
Provided are methods, computer programs and apparatus for communication in a distributed object-oriented data processing environment. Requests for retrieval of...
Electronic data processing system and method for monitoring the
A method for monitoring of the functionality of an EDP system that is monitored in portions thereof by respectively associated agents that are designed to...
Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
Method and system for securing a disk key
In accordance with an embodiment of the present invention, a trusted client includes a non-volatile memory programmed with an encrypted disk key. The encrypted...
Secure multimedia data transmission method
A secure method and system of digital data transmission between a sender and a receiver, including a phase of receiver authentication by a symmetrical...
Enterprise computer investigation system
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method...
Hard disk security method in a computer system
This invention presented a hard disk security method in a computer system, which provides a hard disk security mechanism combining with the power-on password...
Encrypted packet inspection
A method, system, and device for encrypted packet inspection allowing an authorized third party device to monitor cryptographic handshaking information (full-...
Method and system for NAND flash support in autonomously loaded secure
Segmenting a boot code to allow separate and independent storage and validation of the segments in a manner that enable secure system boot by autonomous fetching...
Secure storage apparatus and method for controlling the same
The present invention discloses a storage apparatus in communication with one or more external systems, including at least one storage region, at least one...
System and method for obscuring hand-held device data traffic information
Increasing security for a hand-held data processing device with communication functionality where such a device includes an access-ordered memory cache relating...
Method and apparatus for exercising and debugging correlations for network
A selected time interval of previously stored security events generated by a number of computer network devices are replayed and cross-correlated according to...
System and method for providing remote forensics capability
A system and method for performing a forensic analysis of a subject computer having a non-volatile memory with a second computer is provided. In one embodiment,...
Distributed security provisioning
Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed...
Security system for synchronization of desktop and mobile device data
A system, method and computer program product for a system, method and computer program product for controlling synchronization between a stationary computer and...