At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Internet protocol switching system and associated method of use
An IP switching system that includes a coder/decoder configured for converting voice between analog and digital; and a first switch coupled to the coder/decoder...
System and method for security key transmission with strong pairing to
Systems and methods for security key transmission with strong pairing to a destination client are disclosed. A security key may be generated by an on-chip key...
Methods and systems for evaluating software for known vulnerabilities
A vulnerability identification and resolution (VIR) computer device for identifying security vulnerabilities in a computer system is provided. The VIR computer...
Systems and methods for prevention of JSON attacks
Methods and systems for establishing secure communications
A method for providing a bit string on at least two electronic devices is provided. A sensor input is received by sensors in the electronic devices and recorded...
Secure front-end interface
A secure front-end interface for a PLC, RTU or similar device is disclosed. A first server is coupled to the PLC via a communications link and is configured to...
Method for establishing secure communication link between computers of
virtual private network
A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a...
WAN transport of frames with MAC security
A physical layer device provides security processing on communication frames that may include tags or headers that are for use in a wide area network. As frames...
Method and apparatus for internet protocol (IP) logical wire security
A method and apparatus for improved approaches for detection of exploits and drift in a network is described. The method includes: determining, by a processor,...
Automated discovery, attribution, analysis, and risk assessment of
A method for profiling network traffic of a network. The method includes obtaining a signature library comprising a plurality of signatures each representing...
Power management network system
A power management network system includes an advanced metering infrastructure (AMI) to communicate with a power supply source to receive power information and...
Systems and methods for identifying an individual
The present application relates to systems and methods using biometric data of an individual for identifying the individual and/or verifying the identity of an...
Secure provisioning in an untrusted environment
Embodiments of methods of provisioning an electronic circuit enable security of sensitive data in a design and manufacturing process that includes multiple...
Method of managing key for secure storage of data and apparatus therefor
A method and apparatus for managing a key for secure storage of data. The apparatus includes a main controller configured to process a command, a cipher unit...
Methods and apparatus for audience research in a content-based network
Methods and apparatus for accurate, secure and uniform exchange of audience research data. In one embodiment, viewership data is provided in real-time and...
Diversity networks and methods for secure communications
Security systems may include sensing, networked communications, stealth, alarms, and countermeasures, any or all of which may adapt to threats. These systems...
Systems, methods, and programs for voter information initialization and
Systems, methods, and programs allow for the secure compilation of vote data from electronic voting machines at a voting location. Systems, methods, and...
Credit card tokenization techniques
The present invention provides techniques in connection with payment transactions. Techniques are included in which a non-merchant entity generates, stores, and...
Apparatus, system and method for stimulating and securing retail
An apparatus, system and method of stimulating a retail transaction. The apparatus, system and method may include obtaining, via an opt-in to an in-store...
Payment terminal system and method of use
A payment terminal, including: a display, an input device configured to generate input signals indicative of a user input, a payment instrument reader...
Secure access to personal health records in emergency situations
A system including a server system, a user terminal and a hardware token, for providing secure access to a data record. The server system comprises storage...
Methods and systems for exact data match filtering
A technique for efficiently preventing exact data words ("entities") from unauthorized disclosure is disclosed. Protect agents installed at various egress...
Random timeslot controller for enabling built-in self test module
A data processing system having a first processor, a second processor, a local memory of the second processor, and a built-in self-test (BIST) controller of the...
Method of detecting fault attack
In a method of detecting a fault attack in a secure memory device, payload data is initialized by determining whether the payload data is consistent. The...
Data processing apparatus
A data processing apparatus is provided, which detects falsification of software to data and rewriting of the data. The data processing apparatus according to...
Method and system for secure access to data files copied onto a second
storage device from a first storage device
A method and system for secure access to data files copied onto a second storage device from a first storage device. A computer receives data from a first...
Adaptive, multi-level security for flight deck applications hosted on
A mobile computing platform for processing data in an environment requiring multiple levels of authentication may include processes to authenticate various...
Ongoing authentication and access control with network access device
Methods and systems are presented for securing network access. One method includes operations for granting a user access to remote computer resources after...
Information vault, data format conversion services system and method
A system and method for providing a secured information vault so that individual owners of personal data may control and manage the access and dissemination of...
Microcomputer with bootable flash memory
The present invention provides a microcomputer having a CPU, a flash ROM which stores programs or the like therein and a read controller which controls reading...
Memory access authority control method and memory management system
A memory access authority control method and a memory management system utilizing the method. By partitioning and designating permissible memory access...
Distributed print management
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
Wireless internet-accessing module, host, communication method thereof,
and data card
A communication method for a host and a wireless Internet access module, and a data card, are provided so that the host implements wireless Internet access with...
Vehicle monitoring system
An example reconfigurable vehicle monitoring arrangement includes a housing securable relative to a vehicle, a communication base at least partially disposed...
Arrangement of a rack and a medical device
In an arrangement of a rack (1) and a medical device (2) to be attached to the rack (1), the rack (1) comprises a first connection element (111) and the medical...
Method and apparatus for encrypting short data in a wireless communication
A method and apparatus is capable of encrypting short data in a wireless communication system When a terminal generates a short data burst in idle mode, the...
Secure wireless communication using rate-adaptive codes
Data are communicated in a wireless network, between a transmitter and a receiver. The transmitter estimates a first channel response between the receiver and...
Encrypted memory device and methods for use therewith
A video processing device is presented for processing video data. This video processing device protects the security of data via encryption when it is stored on...
Computer-based system and method for adding variable security data in
A computer-based method and a system for adding and printing variable security data. The system includes a memory, a processor, and a printer. The memory stores...
Determining a reduced set of remediation actions for endpoint integrity
In general, the disclosure relates to techniques for identifying a reduced set of remediation actions that are to be performed by a network endpoint to achieve...
File transfer method and device
Embodiments of the present invention provide a file transfer method. A file is received and cached from a sending device. At least one data packet is sent to a...
Method and apparatus for packet source validation architecture system for
enhanced internet security
A system of enhanced global computer network security provides for a globally unique human signature code that is provided in the header of a data packet and...
Apparatus, system and method for secure data exchange
A SDE manager, a method of communicating secure data through a generic electronic delivery system and a SDE client located on a computing device of a user are...
Secure one-way interface for OPC data transfer
A system for transmitting OPC information from a first network in a first security domain to a second network in a second security domain. A first stand-alone...
Encryption key management program, data management system
An objective of the present invention is to ensure security of the file sharing function provided by cloud storages without significantly decreasing the...
Secure network storage
This invention includes a synchronized storage server enabled to send the end-point device a notification including the root folder list. The end-point device...
Method for operating, monitoring and/or configuring an automation system
of a technical plant
A method for operating, monitoring and/or configuring an automation system of a technical plant from a remote device may include a control software ensuring...
Method for securely associating data with HTTP and HTTPS sessions
A computing system, method and product comprising a server, a mobile device comprising a client interconnected with the server via a data network, the client...
Method and system of providing link adaptation for maximizing throughput
in mobile satellite systems
Various approaches are introduced to provide link adaptation to maximize the resource utilization of the satellite network: (i) a method to adapt the...
Interface deactivation for communication between electronic appliances
A method for controlling the flow of data in a near field communication appliance having an interposed element and a plurality of secure elements is disclosed....