At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Data carrier and method for the production thereof
The invention relates to a data carrier, especially a value document or security paper, having a substrate (20) and, applied on the substrate, a coating (12)...
Vehicle service system optical target assembly calibration
A machine vision vehicle wheel alignment system for acquiring measurements associated with a vehicle. The system includes at least one imaging sensor having a...
Application and data removal system
A method, programmed medium and system are provided for a server-based security manager application to support a self-cleaning operation on a remote...
Taint tracking mechanism for computer security
A system that includes a memory and processor is provided. The processor is programmed to receive input data, determine that the input data is tainted, store...
Restricted access memory device providing short range communication-based
security features and related methods
A memory device may include a memory, a host interface connector, a short range communication transceiver, and a processor coupled with the memory and the short...
Ultra-low power single-chip firewall security device, system and method
A firewall security device, system and corresponding method are provided that includes an operating system of an entirely new architecture. The operating system...
Firewall for controlling connections between a client machine and a
A firewall system adapted for location outside the client machine, preferably in the same data processing device as the client machine but outside a virtual...
System and methods for enforcing software license compliance with virtual
A virtualization system supports secure, controlled execution of application programs within virtual machines. The virtual machine encapsulates a virtual...
Minimum lifespan credentials for crawling data repositories
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search...
Quantifying risk based on relationships and applying protections based on
An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are...
Systems, methods, and computer program products for managing secure
Systems, methods, and computer program products are provided for performing content management operations. At least one memory stores data, and a central...
Data broadcast processing device, method and program having features that
prevent simultaneous execution of...
The present invention relates to a data broadcast processing device, method, and program which enable secure control of an operation of a data broadcast...
Implementing portable content protection to secure secrets
A source-level compiler may randomly select compilation conventions to implement portable content protection, securing the secrets embedded in a program by...
Code inspection executing system for performing a code inspection of ABAP
The present invention relates to a code inspection executing system for performing a code inspection of ABAP source codes, and particularly, to a code...
Secure connection protocol for image projecting unit, process and program
There has been a problem of necessitating a complicated work for establishing a connection capable of intercommunication between a computer as server and a...
Method for order invariant correlated encrypting of data and SQL queries
for maintaining data privacy and...
According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a...
Increasing security in inter-chip communication
An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The...
Systems and methods for securely transferring personal identifiers
A system for transferring secured data has an authentication facilitator that transmits data indicative of a graphical key pad to a remote display device of a...
Authentication of data streaming service
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security...
Secure processing systems and methods
This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to...
Agile network protocol for secure communications with assured system
A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field....
Methods for providing security over untrusted networks
Methods for providing for secure communications across data networks, including untrusted networks. In one embodiment, the method comprises establishing...
Using a content delivery network for security monitoring
A content delivery network includes a plurality of cache servers. Each cache server is configured to receive a request for content from a client system and...
Directing messages based on domain names
A communication system has a plurality of collections. Each collection comprises a security boundary within which private data is accessible. Each collection is...
Method for securely distributing meeting data from interactive whiteboard
Distributing meeting data from an interactive whiteboard projector to at least one computer of a meeting member, comprises: in the interactive whiteboard...
Method and apparatus for security information visualization
Visualization for presenting event information indicative of a computer security threat is automatically selected from available visualizations. Event...
Rule based processing system and method for identifying events
The present invention generally relates to a computerized system and method for creating, optimizing, and using a rules processing system that evaluates...
Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care...
Secure communications via NFC device
A system, method, and apparatus for negotiating a communication link between first and second near field communication (NFC) devices is disclosed. A third NFC...
Apparatus, system and method for monitoring and maintaining critical
An apparatus, system and method for maintaining critical medical equipment for stockpile applications are provided. The apparatus, system and method of the...
Time-varying PHY-level wireless security
A method for communication includes generating a data transmission including multiple successive parts in respective time intervals, for transmission to a...
System and method for using fingerprint sequences for secured identity
According to one embodiment of the present disclosure, a method includes receiving session information including first fingerprint data corresponding to each of...
Application of Z-webs and Z-factors to analytics, search engine, learning,
recognition, natural language, and...
Here, we introduce Z-webs, including Z-factors and Z-nodes, for the understanding of relationships between objects, subjects, abstract ideas, concepts, or the...
Establishing, at least in part, secure communication channel between nodes
so as to permit inspection, at least...
An embodiment may include circuitry to establish, at least in part, a secure communication channel between, at least in part, a client in a first domain and a...
Delegate access in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
Tamper-resistant video surveillance network
A network of surveillance digital video cameras is provided. Each camera records video data and provides the video recordings to other networked cameras as well...
Dynamically reconfigurable 2D topology communication and verification
Systems and methods for securing devices and encoding information in hardware and hardware arrangements are provided. Variations include switched networks...
Computer motherboard having peripheral security functions
A secure motherboard for a computer, wherein each user accessible peripheral port is protected by hardware based peripheral protection circuitry soldered to the...
Automated privacy enforcement
A system and method of protecting the privacy of data is presented. The system and method may include receiving data from a data warehouse and determining an...
Generating and storing document data
A markup language document is generated and stored within a network, the network including a client, and one or more storage locations. A markup language...
Systems and methods for analyzing client-side storage security for
A computer-implemented method for analyzing client-side storage security for Internet applications may include 1) identifying an interactive Internet resource,...
Apparatus and method for enhancing security of data on a host computing
device and a peripheral device
A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication...
System and method for implementing content and network security inside a
Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary...
Method and system for abstracted and randomized one-time use passwords for
A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user...
Providing secure dynamic role selection and managing privileged user
access from a client device
An approach is provided that receives a first role selection from a client device. Each of the roles includes various user accounts provisioned to access...
Soft method for local secure connection to a device
A system for pairing two devices includes a monitoring system and a server. The monitoring system receives a request made by a local submitter, such as...
Secure mobile browser for protecting enterprise data
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
Secure content publishing and distribution
Sending installation information. A method may be performed, for example, in a network computing environment including one or more servers connected to one or...