At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Firewalls for securing customer data in a multi-tenant environment
Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to...
Multimode retail system
Embodiments of a multimode system for use in, for example, a fuel dispenser, are configured for receiving data in a retail environment. The multimode system can...
Limiting data exposure in authenticated multi-system transactions
The limiting of data exposure in authenticated multi-system transactions is disclosed. A client system authenticates and requests secured data and unsecured...
Systems and methods for trading a trade list in financial markets
Systems and methods are provided for maintaining neutrality while trading a list of securities using an algorithmic trading facility coupled with at least one...
Method and apparatus for automated trading of equity securities using a
real time data analysis
A system and method for buying and selling securities based on volatility and liquidity rather than other fundamentals is demonstrated. The method involves:...
Security for objects in a process plant configuration system
A configuration system uses process plant items that may represent, or be capable of representing, entities in a process plant to assist in configuring,...
Device and method for controlling usage of a memory card
A memory card includes a memory for storing data and a controller that is operative to control access to storage of at least a portion of storage conditional...
OMNIGENE software system
A software system which employs a special set of simulated electrical circuits to generate user-specific textured and signature color images based on DNA,...
Systems and methods for distributing and securing data
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A...
Teired key communication system and method in support of controlled vendor
A computer-implemented system processes secure electronic documents from one or more content providers in accordance with subscriber instructions has a...
Wired communications systems with improved capacity and security
Provided are methods and systems of using division-free duplexing (DFD) in a cable communication network. Techniques for applying DFD in a cable communication...
System and method for secure communication of components inside
Method to secure the communication of components within self-service automats that are linked to each other by a bus system, having a transmitter and a...
Data transformation apparatus, data transformation method, and computer
A non-linear transformation processing structure having a high implementation efficiency and a high security is realized. Data transformation is performed using...
The present invention relates to a depiction arrangement for security papers, value documents, electronic display devices or other data carriers, having a...
Vascular pressure sensor with electrocardiogram electrodes
Devices, systems, and methods for sensing cardiac electrical activity and blood pressure within a blood vessel are disclosed. A vascular sensor includes a...
Railway tie automated preplating apparatus
The invention is an apparatus for pre-plating railway ties, including switch ties of varying lengths. An infeed deck and singulator feeds individual ties, each...
Unlocking tool for male connector
A connector of a cable (e.g., a 30-pin connector) can be used to facilitate various security-related and other functionalities. For example, a connector can...
Data exfiltration attack simulation technology
Novel systems and methods for testing network security are disclosed. In one example, at least one specified data message and at least one specified access...
Signature creation for malicious network traffic
An endpoint on a network uses detection data to detect a malicious software attack. The endpoint identifies content associated with the attack, such as a...
System, method and computer program product for rendering data of an
on-demand database service safe
In accordance with embodiments, there are provided mechanisms and methods for rendering data of an on-demand database service safe. These mechanisms and methods...
Hierarchical organization of data associated with events
Methods, data structures, systems and computer program products are provided for organizing security data. A triggering security event is hierarchically related...
Use of synthetic context-based objects to secure data stores
A processor-implemented method, system, and/or computer program product secures data stores. A non-contextual data object is associated with a context object to...
Multi-session secure tunnel
A method of communicating data over a network is provided. A secure tunnel may be implemented through the network between two computers. Performance limitations...
Building data security in a networked computing environment
In general, embodiments of the present invention provide an approach for providing a multi-tenant/customer partition group separator and securer in a shared...
Session sharing in secure web service conversations
Techniques are disclosed for sharing communication session information sharing in web service applications. The techniques include management of concurrent...
Systems and methods for user access authentication based on network access
Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a...
A method and a system for monitoring and controlling remote devices are described. The system has a gateway, a web server, and a client device. The gateway is...
System and method for supporting multiple identities for a secure identity
A multiple-identity secure device (MISD) persistently stores a single identification code (a "seed identity"). The seed identity need not be a network address,...
Securing a data segment for storage
A method begins by a dispersed storage (DS) processing module encrypting a data segment utilizing an encryption key to produce an encrypted data segment and...
Secure storage and replay of media programs using a hard-paired receiver
and storage device
A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. The method comprises the steps of receiving a data stream...
This document discloses data security systems and methods of securing data. A cache memory can be connected between a decryption engine and a central processing...
Digital data authentication and security system
The present invention includes a system and process for generating secured, marked digital files. A cryptographic token is inertly embedded in markup language...
Secure external buffer for hard disk drive system on a chip
A system securely buffers hard disk drive data using a host side eXlusive OR (XOR) encryption engine. A host communicates with an encryption interface...
System and method for sequentially processing a biometric sample
This invention provides for progressive processing of biometric samples to facilitate user verification. A security token performs initial processing. Due to...
Network based management of protected data sets
A system that includes an account management module configured to maintain protected accounts. For instance, a particular protected account includes a protected...
Device and method for a backup of rights objects
A common backup format of a backup rights object according to embodiments of the present invention has the following features: License information that is not...
Method and processing unit for secure processing of access controlled
A method for verifying access conditions performed by two conditional access devices consecutively on a control message before releasing a control word to a...
Method and apparatus for securing confidential data for a user in a
Method and apparatus for securing confidential data related to a user in a computer is described. In one example, rules are obtained that provide a...
Enhanced privacy ID based platform attestation
As opposed to utilizing a manufacturer provisioned EK Certificate for AIK processes, embodiments of the invention utilize EPID based data. EPID mitigates the...
Information processing apparatus, method, and computer-readable storage
medium that encrypt data in a blob...
An information processing apparatus includes a main memory unit storing while on-power; an auxiliary storage unit functionable even off-power; a control unit...
Secure boot of a data breakout appliance with multiple subsystems at the
edge of a mobile data network
A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform...
System and method for optimizing data remanence over hybrid disk clusters
using various storage technologies
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming...
Uploading and downloading unsecured files via a virtual machine
Methods, computer program products, and apparatuses are provided for securely exchanging a data file between a client machine and a remote application server...
Updating dispersed storage network access control information
In a dispersed storage network where slices of secure user data are stored on geographically separated storage units, a managing unit connected to the network...
Support vector machines processing system
An implementation of SVM functionality improves efficiency, time consumption, and data security, reduces the parameter tuning challenges presented to the...
System and method for a private and secure financial transaction system
using a central system
A financial transaction system between a customer and a financial institution has a central system that facilitates private and secure payment transactions from...
System and method for providing alternate funding source for portable
A system, apparatus, and method for providing a mechanism for loading a prepaid card, such as a payroll card, with funds from a source other than the employer...
Financial data entry system
A method of tracking and aggregating all Securities and Exchange Commission (SEC) "shelf" registration and all capital market activity related to those shelf...
Security system comprising a self-mixing laser sensor and method of
driving such a security system
A security system is described, comprising a sensor module (15) which accommodates a laser sensor (10) working with self-mixing interference. The laser sensor...
Method for processing location information relating to a terminal
connected to a packet network via a cellular...
A method (400) for processing location information relating to a certain mobile station in a cellular network is presented. The method involves a first network...