At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for providing security data to security stations
There is provided a system and method of selectively directing collected security data that may be displayed concurrently at a first security station and at a...
Efficient data structures for multi-dimensional security
Efficient data structures are generated to enforce permissions on a multi-dimensional representation in a performance management application. A model site is...
Method for securing data and/or applications in a cloud computing
A method for securing data and/or applications within a cloud computing architecture is provided. According to the invention, a security module is provided, the...
Network security monitor apparatus and network security monitor system
A network security monitoring apparatus and a network security monitoring system manages "permitted" or "not permitted" communication between nodes based on an...
Fixing security vulnerability in a source code
A computer implemented method for automatically fixing a security vulnerability in a source code. The method includes obtaining identification of a code block...
Secure storage of protected data in a wireless communication device
A wireless communication device comprises first processing circuitry configured to execute an RF operating system and second processing circuitry configured to...
Support for secure objects in a computer system
A method and structure in a computer system, including a mechanism supporting a Secure Object that includes code and data that is cryptographically protected...
Assessing risk associated with a computer technology
Systems and methods of assessing vulnerability or risk associated with a computer technology are presented. The system and method may include receiving a...
Protection method, decryption method, recording medium and terminal for
said protection method
Protecting data transmission, either multimedia or a control word, between a security processor and a terminal includes, at the security processor, building a...
Method and processing unit for secure processing of access controlled
A method based on access conditions verification performed by two conditional access devices consecutively on a control message before releasing a control word...
Near field registration of home system audio-video device
A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC...
Point of sale (POS) personal identification number (PIN) security
A key is securely injected into a POS PIN pad processor in its usual operating environment. In response to entry of a personal identification number (PIN) into...
Distribution system and method for distributing digital information
A distribution system and method for distributing digital information is provided, which has high recoverability from a security breach. The distribution system...
Remote access to a mass memory and a security memory in a portable
The invention relates to a system for remotely accessing a mass storage unit and a security storage unit in a portable communicating object. According to the...
Method and device for performing communication on a bus structured network
The invention refers to a method for performing communication on a bus structured network between master device and slave devices using a bi-directional data...
Relevancy improvement through targeting of information based on data
gathered from a networked device...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with...
Network message generation for automated authentication
A message generation mechanism for a network interface is provided. The message generation mechanism is operable to generate a message which includes data for...
Secure messaging facility system
A secure message facility transfers authentication data between various applications, operating systems, and authentication devices and software in the form of...
Supplying data storage services
A method is used in supplying data storage services. For a set of applications running on an electronic system, an application service is provided to each...
System, method and apparatus for traffic mirror setup, service and
security in communication networks
The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be...
Controlling data routing in integrated security systems
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
Systems and methods for performing authentication of a customer
interacting with a banking platform
The invention provides systems and methods of authenticating a customer device, in conjunction with a requested interaction, the customer device associated with...
Modular object and host matching
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with...
Personal event data recorder
A personal event data recorder (PEDR) is provided. The PEDR may be integrated within a mobile communications device or may be provided as a separate add-on...
Method for a secure detach procedure in a radio telecommunications network
The present invention proposes a method for performing a detach of a terminal registered to a telecommunication network by associating an identification for...
Method and apparatus for tracking a transported item while accommodating
A method and apparatus is provided for minimizing potential security problems and battery power usage in a tracking device used in tracking an associated...
Secure data exchange with identity information exchange
Systems and methods for authenticating authorized users of electronic communication devices, such mobile communication devices, for a secure data exchange...
Wavelength sensing lighting system and associated methods for national
A wavelength sensing lighting system may include a light source, a sensor and a controller. One or more light sources and sensors may be included in an array....
Method of providing security for transmitting a digital medical image
A method of preparing a digital medical image for secure transmission, the method comprising embedding data into the digital medical image using a reversible...
Cryptographic security functions based on anticipated changes in dynamic
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
Streaming video to cellular phones
A method, system, and computer program product for deploying data to a web server for streaming video to a mobile device. The method can include receiving a...
Distributable, scalable, pluggable conferencing architecture
Architecture for a scalable, pluggable multi-party, and distributed multimedia conferencing. A centralized policy and control conferencing component allows the...
Dynamic information radio-frequency identification (RFID) card with
Embodiments of the present invention implement dynamic elements within a RFID card. Specifically, the embodiments update card information dynamically, using a...
Methods and apparatus for securing a portable device
An apparatus for securing a portable device is described. The portable device includes a housing having a mating feature adapted to mate with a corresponding...
Secure smart card system
A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of...
Security classification applying social norming
An embodiment of the invention provides a method for security classification applying social norming. More specifically, content is received from a user via an...
Method for the authentication of applications
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a...
Providing cryptographic security for objective-oriented programming files
An apparatus and method for providing an Internet Web services for securing the transmission of data between object oriented software infrastructure and...
Reducing a size of a security-related data object stored on a token
Embodiments of the present invention provide a method and system, including a client and security token, for reducing a size of a security-related object stored...
Methods and systems for internet protocol (IP) packet header collection
A computer-based method for providing information about a potential security incident ascertained from received internet protocol (IP) packets is described. The...
Security-enhanced computer systems and methods
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each...
Network security protection
A method and system for providing security to a Network Job Entry (NJE) network. A first NJE node and a third NJE node are connected by a second NJE node. The...
Method and system for providing secure peer-to-peer file transfers
A method and system for providing secure peer-to-peer file transfers whereby request/negotiation message mechanisms used to negotiate file transfers between...
Generating security material
An apparatus and method establish a secure, direct, station-to-station communication between a first station and a second station in a topology (e.g., PBSS)...
Systems and methods for preparing and submitting documents to comply with
Systems and methods for preparing and submitting documents to a regulatory agency in an on-line environment are provided, which are used for the purpose of...
Method and apparatus for creating an information security policy based on
a pre-configured template
A method and apparatus for creating a policy based on a pre-configured template is described. In one embodiment, source data having a tabular structure is...
Mobile communication device surveillance system
A mobile communication device surveillance system is described. The system includes a gateway, a web server, a wireless mobile communication device, and a...
Information receiving apparatus, data downloading method, and information
An information receiving apparatus includes: a communication unit; a storage unit that stores data; a data acquisition unit that acquires distribution data that...
Data transmission device and data transmission control device
Disclosed is a technique for effectively transmitting a plurality of contents under the situation securing minimum QoS. According to the technique, among a...
Service access method, device, and system
The present invention provides a service access method, device, and system, and relates to the field of television services, to guarantee multicast security of...