At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Technique for effectively providing personalized communications and
information assistance services
A user may utilize a communication device, e.g., a wireless phone, mobile device or personal digital assistant (PDA), to contact an information/call center...
System for acquiring seismic data in a marine environment, using seismic
streamers coupled to means for...
Disclosed herein is a system of acquiring seismic date in a marine environment, which includes: seismic streamers towed by a vessel; and means for detecting...
Methods, systems, and products for security services
Methods, systems, and products are disclosed for notification of alarms in security systems. An alarm is detected in a security system. An alarm code is...
Apparatus to interconnect orthogonal circuit boards for high data rate use
An apparatus includes a chassis securing a midplane and forming a bay orthogonally aligned with the midplane. A module secures a circuit board with connectors...
Integrated circuits with persistent data storage
The circuitry introduced in this invention selectively slows down the functioning of an electronic circuit maintaining a particular state for a prolonged period...
Method and apparatus for testing piston seals
A seal testing apparatus includes a clamp assembly which receives, secures and rotates a piston and seal assembly, a mandrel which extends into the seal...
Cloud key directory for federating data exchanges
Embodiments are directed to providing attribute-based data access. In an embodiment, a data request specifies one or more search data attributes describing...
Visual securement of sensitive data
Various embodiments of systems and methods for visual securement of sensitive data are described herein. In one aspect, the method includes receiving a request...
Weighted security analysis
A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A...
Native code module security for arm 64-bit instruction set architectures
Methods, systems, and apparatuses, including computer programs, for safely executing a native code module for an ARM 64-bit instruction set. The native code...
Maintaining data integrity
Aspects of the present invention maintain data integrity of a monitored data object in a monitored storage repository. A first security value for the monitored...
Secure server architecture for web based data management
A double firewalled system is disclosed for protecting remote enterprise servers that provide communication services to telecommunication network customers from...
Web service security cockpit
A first configuration object identifies attributes of a configuration of a first web service. Security setting data is identified defining a security setting...
Enhancing useability of mobile devices that securely store data
Methods, computer-readable media, and systems for enhancing useability of mobile devices that securely store data. An input to transfer a computer software...
A media access control (MAC) security apparatus for a local area network interface includes a parser, an encryption engine, an authentication engine, and a...
Method and apparatus for a scalable and secure transport protocol for
sensor data collection
A new approach for a transport protocol for sensor data collection, such as a smart grid is described. In one embodiment of the invention, each server avoids...
Techniques for ensuring authentication and integrity of communications
Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a...
Secure transmission with error correcting code
The invention concerns a method and a system for encoding digital data (DATA) represented by source symbols, with an error correcting code generating parity...
Control word obfuscation in secure TV receiver
A device for descrambling encrypted data includes a descrambler, a secure link, and a secure element that securely transmits a control word to the descrambler...
Providing virtual networks using multi-tenant relays
Embodiments are directed to providing a multi-tenant relay service that securely relays data between computer systems. A computer system receives a portion of...
Dynamic partitioning of applications between clients and servers
Optimization mechanism that dynamically splits the computation in an application (e.g., cloud), that is, which parts run on a client (e.g., mobile) and which...
Municipal bond tracking and evaluation system
The present invention relates to a web-application that gathers raw data and meta data, matches debt related data with corresponding meta data, marks the debt...
Safety system and device and methods of operating
Various embodiments of a device, system and methods that promote safety and security within an organization. Sensor data from one or more installation sensors...
Apparatus and method for power production, control, and/or telematics,
suitable for use with locomotives
A power system housed in modules or containers may be located as a unitary structure for example secured to a locomotive platform, allowing easy retrofits. A...
Providing enhanced security for wireless telecommunications devices
A method and system for use in providing enhanced security for wireless telecommunications devices is disclosed. In at least one embodiment, the method and...
Cellular device security apparatus and method
A cellular communication device has one or more access modes which allow reading and writing of data, for example to change its settings, for example passwords...
Encrypted communication system, transmitter and receiver using same
High-security communications against information leakage as well as high-speed communications are realized using present optical fiber networks. The methods are...
Method and apparatus for identifying and monitoring VoIP media plane
security keys for service provider lawful...
A mechanism is described that enables encrypted end-point communications in a VoIP network to be accessed by a service provider. The mechanism includes a...
Method and system for managing information among personalized and shared
resources with a personalized portable...
A user's request via a portable or handheld wireless communication device (HWCD) to process data may result in discovery of one or more networked resources...
Supercritical fluid cleaning of banknotes and secure documents
A method and apparatus for cleaning a stack of secure instruments is disclosed. Each secure instrument includes a substrate, visual data and a security feature....
System and method for secure automated data collection
The invention provides for an automated data collection having an endpoint coupled to at least one gaming machine to collect data from the at least one gaming...
Secure voting via multimedia processing resources
A voting server receives votes from a multimedia processing resource (MPR) and executes instructions for determining whether a user location is an approved...
Secure smartphone-operated gun lock with means for overriding release of
A gun locking and unlocking device, which may be configured to be disposed adjacent the trigger of a gun to alternatively prevent or enable firing, includes a...
Context-based security screening for accessing data
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with...
Hardware enforced content protection for graphics processing units
A graphics processing unit (GPU) is configured to access a first memory unit according to one of an unsecure mode and a secure mode. The GPU may include a...
Method and system for controlling the execution of a function protected by
authentification of a user, in...
A method and system for controlling the execution of a function protected by authentication of a user and which is provided for example for the access to a...
Authentication with massively pre-generated one-time passwords
Embodiments of the invention provide systems and methods for the storage of One-Time Passwords (OTPs) on a device (principal) that needs to authenticate from...
Methods and apparatuses for securely operating shared host computers with
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable...
Method and apparatus for wireless security enhancement using multiple
attributes monitoring, continuous and...
The present invention is an adaptive secure wireless communications system and method. Generally, the present invention may be operable to address challenges...
Data system forensics system and method
A system and method for creates, maintains and monitors individuals, organizations and artifacts relating to the same over time with respect to pedigree and...
System and method for determining and using local reputations of users and
hosts to protect information in a...
A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in...
Dividing a data processing device into separate security domains
This invention creates separation between personal applications and corporate applications on a data processing device, so that both types of applications can...
Integrating policies from a plurality of disparate management agents
Described herein are embodiments for managing policies of a mobile device. In embodiments, a mobile device receives policy containers from a plurality of...
Critical security parameter generation and exchange system and method for
smart-card memory modules
A storage device contains a smart-card device and a memory device, which is connected to a controller. The storage device may be used in the same manner as a...
Method and apparatus for sequential authentication using one or more error
rates characterizing each security...
Methods and apparatus are provided for sequential authentication of a user that employ one or more error rates characterizing each security challenge. According...
Near field communication (NFC) device and method for selectively securing
records in a near field communication...
A method and apparatus for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC)...
Strong authentication token with acoustic data input
Strong authentication tokens for generating dynamic security values having an acoustical input interface for acoustically receiving input data are disclosed....
Remote device secure data file storage system and method
A remote device secure data file storage system and method of securely storing data files at a remote device, includes a host system having a database and a...
Short-range secure data communication method based on sound wave or audio,
and apparatus thereof
The present invention discloses an apparatus, a system and a method for short-range sound wave communication. The system realizes non-contact secure...
Securing digital content system and method
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or...