At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Security system for shipping containers
The system described here is a system for monitoring security of shipping containers, which includes: a plurality of shipping containers, each having a bolt-type...
Shipping container security system
The system described here is a shipping container security system including a bolt-type seal lock module located on an exterior surface of a door of a shipping...
Apparatus, system, and method for deploying iSCSI parameters to a diskless
An apparatus, system, and method are disclosed for deploying sensitive communication parameters to a diskless computing device. A parameter structure module is...
Apparatus and method for selective mirroring
An apparatus is described that facilitates selective mirroring through processing of network traffic in accordance with provisioned rules and policies. The...
Remote administration of smart cards for secure access systems
A secure access method for use with a communication network which communicates information between an information resource controller and a remote unit...
Securely calling web services from macros
A method of securing communications between an application that includes a macro and a Web Service. The method includes an act of, at the macro, generating a...
Detecting compromised computers by correlating reputation data with web
Compromised host computers in an enterprise network environment comprising a plurality of security products called endpoints are detected in an automated manner...
System and method for on-demand dynamic control of security policies/rules
by a client computing device
A system and method for an end user to change the operation of a data flow filter mechanism, such as a firewall, that operates to control data flows between a...
Systems and methods for authenticating and protecting the integrity of
data streams and other data
Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication...
Using bluetooth to establish ad-hoc connections between non-bluetooth
wireless communication modules
Using Bluetooth to provide the network management functions such as device discovery, service discovery, security negotiation, and connection establishment. Upon...
Security checking program for communication between networks
A method for determining if a multiplicity of networks are authorized to communicate with each other and what IP protocol can be used for communication between...
Communication system and session establishment method
A communication system capable of securely preventing illegal use of addresses and enhancing confidentiality of communication. Based on an originating-side real...
Content data recording device and recording control method
Electronic device capable of automatically securing a capacity for recording a second content data other than a first content data even in the case of...
System and method for UDDI data migration using standard UDDI v3 API
A system and method are described for Universal Description Discovery and Integration (UDDI) data migration exporting existing UDDI V3 data from a UDDI V3...
System and method for postal indicia printing evidencing and accounting
System and method for printing indicia on mailing items, such as envelopes, cards, or label media, has a host computer system connected to a postal security...
Systems and methods for credit card fee calculation
In some embodiments, a calculation system may be used by a merchant to determine a merchant fee associated with a credit card transaction. The calculation system...
Method and system for managing collateral or property risk in a secured
loan or lease portfolio
A method for managing collateral or property risk in a secured loan or lease portfolio includes monitoring the insurance status of each individual loan or lease....
Method and system for collection and analysis of shareholder information
A system and method is provided for the gathering of and manipulation of shareholder data, including information on individual shareholders and related...
Methods and apparatus for secure, portable, wireless and multi-hop data
A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The...
Method for key distribution in a hierarchical multicast traffic security
system for an internetwork
Multicast networks are partitioned into hierarchical security domains. Each security domain may comprise one or more lower security domains. Each security domain...
Systems and methods for negotiating security parameters for protecting
management frames in wireless networks
Systems and methods provide a mechanism for wireless stations and access points to negotiate security parameters for protecting management frames. The access...
Network mobility security management
A node that couples to the Internet establishes a secure connection with another node that couples to the Internet. The secure connection to be established via...
Method and system for maintaining high reliability logical connection
A method and system for maintaining a high reliability logical connection between hosts employs adaptive transparent pinging, clone blocking and bandwidth...
Recording medium, method and apparatus for reproducing data on the
recording medium, and method and apparatus...
A recording medium on which data is recorded in units of clusters, a method and apparatus for reproducing data on the recording medium, and a method and...
Image processing apparatus
An image processing apparatus that enables to embed a secure pattern code in an output image with an inexpensive configuration. An image reader has a color...
Security system for mass transit and mass transportation
A security system and method for mass transit and mass transportation whereby high capacity mobile vehicles such as ships, buses, planes, trains and subways...
Configurable smart utility meter box
The invention relates to a meter box for housing a utility meter and configured for associating a customer service line to a utility service line. The meter box...
Ankle-foot orthosis device
An ankle-foot orthosis comprising a leg member 12; a foot member 14; a frame 16 connecting the leg member to the foot member, wherein the frame comprises a first...
Multiplexed secure video game play distribution
Multiple video game players access an encrypted video game library stored on a shared mass storage device. A multiplexer multiplexes data read from the mass...
Secured verification of configuration data for field programmable gate
A method and apparatus for providing automated and secured verification of configuration data for a volatile progrannmable electronic device, such as an FPGA, is...
Method for the dual coding of information on physical media and in a
computerized format (DOTEM)
DOTEM is an information-coding method which is used to represent same on physical media with the aid of dots and in a computerised format, in memory and on...
Apparatus, method and computer program product for detection of a security
breach in a network
A method for detecting a security breach in a network comprises at one of a plurality of transceivers each having a different media access control address,...
Comprehensive security structure platform for network managers
A computer system and method for detecting and monitoring network intrusion events from log data received from network service devices in a computer network, the...
Method and apparatus for securing a peripheral data interface
A method and apparatus for controlling connectivity comprising a connectivity control element coupled between an interface connector and an interface circuit,...
Method and apparatus for optimal transfer of data in a wireless
An apparatus and method for sharing data in a communications system include a bootstrapping server function (BSF) configured to transmit a first message. The...
System for and method of verifying IC authenticity
A verification system disclosed herein uses the unique signatures of an IC to perform authentication of the IC after the IC is shipped to a customer. The...
Anonymous peer-to-peer communication
An anonymous peer-to-peer network has a security protocol that allows hosts in the network to determine whether data received from the network is valid. The...
Programmable memory device security
A removable digital data storage device has a programmable memory controller, a data storage medium and a data destruction means. The memory controller is...
Method and system for an intercept chain of custody protocol
Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may...
Method, components and system for tracking and controlling end user
A privacy service is provided for use in protection of user data transferred in a network, including a converged network. The privacy service extracts and...
System and method for providing private inference control
A system and method for providing private inference control is presented. A query count and database including records are maintained. Each record includes...
Preferred credit information data collection method
A creditor creates a lock box at a financial institution. The lock box includes an escrow provision. A consumer makes regularly scheduled payments to the...
Integrated trading information processing and transmission system for
A system is provided for processing and transmitting trading information for exempt securities or assets not otherwise listed, traded, valuated or bought/sold in...
Method for directing and executing certified trading interests
Preferred embodiments of the subject invention comprise: (a) electronically receiving securities order-related data regarding a set of securities market...
Method and system for optimal pricing and allocation for a set of debt
instruments to be offered
A method and system for the determination of optimal pricing and allocation of securities in an open, competitive environment. The method and system may also be...
Data security in wireless network system
For data protection in a wireless network system, a frame, including its Medium Address Control (MAC) header and payload, is encrypted with an initialization...
Method and system to provide security implementation for storage devices
In one embodiment, method that can be performed on a system, is provided to security implementations for storage devices. In one embodiment, the method comprises...
Local area network of serial intelligent cells
A serial intelligent cell (SIC) and a connection topology for local area networks using Electrically-conducting media. A local area network can be configured...
Method of operating integrated circuit embedded with non-volatile
programmable memory having variable coupling...
A programmable non-volatile device is operated with a floating gate that functions as a FET gate that overlaps a portion of a source/drain region and allows for...
Automatic dependent surveillance system secure ADS-S
An air traffic control automatic dependent, WAAS/GPS based, surveillance system (ADS), for operation in the TRACON airspace. The system provides encryption...