At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Remote monitoring systems for monitoring medical devices via wireless
A remote monitoring system for monitoring a plurality of medical devices at a patient care or home care facility. The system includes a device integration...
System and method for enabling channel community ratings in an IP
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables...
Self initiated prone progressive crawler
A self initiated prone progressive crawler facilitates crawling in infants by sensing the infant's intent and assisting movement. The device is designed as a...
Methods and systems for aircraft data communications over heterogeneous
Methods and systems for communicating data between an aircraft and an off-board network are provided. The method includes pre-loading data for the aircraft onto...
Data encryption and decryption method and apparatus
This present application relates to data encryption and decryption technology, and especially relates to a data encryption and decryption method and apparatus....
Method and system for handling security synchronization for prolonged
periods of no-reception of voice frames
A method and system for handling security synchronization for prolonged periods of no-reception of voice frames. The method includes receiving one or more...
Collection of subscriber information for data breakout in a mobile data
A method and system supports subscriber based IP data breakout at the edge of a mobile data network without monitoring the use of security keys or breaking into...
Electrophotographic image output device
An electrophotographic image output device includes an image processor to receive input image data, and a line screen to represent halftone images and have...
Liquid crystal display
A liquid crystal display apparatus includes a plurality of pixels having first and second subpixels, a plurality of gate lines connected to the first and second...
Pixel and organic light emitting display device using the same
An organic light emitting display device is capable of securing sufficient compensation period such that a threshold voltage of a driving transistor may be...
System and method of anomaly detection
A method and apparatus wherein the method includes detecting a plurality of events within a security system, evaluating the events using one of a first...
System and method for secure card packaging and activation
A secure card package including features such that an activable card disposed in the secure card package is activable only upon separation of a first portion...
Data center container with cooling system
A data center container includes a chassis, a cover, a cooling system, a water outlet, a water tray, and a connecting pipe. The cover is secured to the chassis....
Case secure computer architecture
Two computing subsystems are disclosed, one a control subsystem, the other a user subsystem, each using engines with augmented conventional instruction sets,...
System for real-time cross-domain system packet filtering
A system for filtering a digital signal transmitted in a protocol featuring multi-level packetization from a first server to a second server. The first server...
Authorization of server operations
An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer...
Systems and methods for managing user permissions
Multi-tiered systems and methods for identifying and monitoring user permissions in a computer network are described. A data structure, such as an index, for...
Secure digital communications
Policies are used when performing a transaction between a first and a second device, the first device having an established trusted communication relation with...
System and method for controlling user access to encrypted data
Disclosed are systems, methods and computer program products for providing user access to encrypted data. In one example, a system is configured to receive a...
Dynamic data loss prevention in a multi-tenant environment
The usage of data in a multi-tenant environment can be controlled by utilizing functionality at the hypervisor level of various resources in the environment....
Single command functionality for providing data security and preventing
data access within a decommissioned...
A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage...
Systems and methods for securing cryptographic data using timestamps
Systems and methods for authenticating playback devices using timestamp validation in accordance with embodiments of the invention are disclosed. One embodiment...
Encryption key destruction for secure data erasure
Techniques for encryption key destruction for secure data erasure via an external interface or physical key removal are described. Electrical destruction of key...
Encryption in the cloud with customer controlled keys
A system and method for encryption in a cloud computing platform with customer controlled keys is disclosed. A cloud-based encryption key is uploaded from a...
Enterprise cloud security gateway
A security virtual machine is provided in a network including a resource shared among two or more virtual machines. All data traffic from each virtual machine...
Synchronous or asynchronous multi layer data link communication between a
multi-functional data bus interface...
A multi layer data link communication system for a vehicle having a remote starter/alarm system, a vehicle computer and an OEM security interface. The system...
Method and system for data usage accounting in a computing device
A method and system for data usage accounting are described herein. As an example, the method can be practiced in a setting that includes both secure...
Correlating web and email attributes to detect spam
A computer correlates web and email attributes to detect spam. A security module on a client collects attributes of a web site to which an email address was...
Securing application information in system-wide search engines
A system for securing application information in a shared, system-wide search service. Each application can register a security filtering module that is to be...
Technique for effectively providing personalized communications and
information assistance services
A user may utilize a communication device, e.g., a wireless phone, mobile device or personal digital assistant (PDA), to contact an information/call center...
System for acquiring seismic data in a marine environment, using seismic
streamers coupled to means for...
Disclosed herein is a system of acquiring seismic date in a marine environment, which includes: seismic streamers towed by a vessel; and means for detecting...
Methods, systems, and products for security services
Methods, systems, and products are disclosed for notification of alarms in security systems. An alarm is detected in a security system. An alarm code is...
Apparatus to interconnect orthogonal circuit boards for high data rate use
An apparatus includes a chassis securing a midplane and forming a bay orthogonally aligned with the midplane. A module secures a circuit board with connectors...
Integrated circuits with persistent data storage
The circuitry introduced in this invention selectively slows down the functioning of an electronic circuit maintaining a particular state for a prolonged period...
Method and apparatus for testing piston seals
A seal testing apparatus includes a clamp assembly which receives, secures and rotates a piston and seal assembly, a mandrel which extends into the seal...
Cloud key directory for federating data exchanges
Embodiments are directed to providing attribute-based data access. In an embodiment, a data request specifies one or more search data attributes describing...
Visual securement of sensitive data
Various embodiments of systems and methods for visual securement of sensitive data are described herein. In one aspect, the method includes receiving a request...
Weighted security analysis
A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A...
Native code module security for arm 64-bit instruction set architectures
Methods, systems, and apparatuses, including computer programs, for safely executing a native code module for an ARM 64-bit instruction set. The native code...
Maintaining data integrity
Aspects of the present invention maintain data integrity of a monitored data object in a monitored storage repository. A first security value for the monitored...
Secure server architecture for web based data management
A double firewalled system is disclosed for protecting remote enterprise servers that provide communication services to telecommunication network customers from...
Web service security cockpit
A first configuration object identifies attributes of a configuration of a first web service. Security setting data is identified defining a security setting...
Enhancing useability of mobile devices that securely store data
Methods, computer-readable media, and systems for enhancing useability of mobile devices that securely store data. An input to transfer a computer software...
A media access control (MAC) security apparatus for a local area network interface includes a parser, an encryption engine, an authentication engine, and a...
Method and apparatus for a scalable and secure transport protocol for
sensor data collection
A new approach for a transport protocol for sensor data collection, such as a smart grid is described. In one embodiment of the invention, each server avoids...
Techniques for ensuring authentication and integrity of communications
Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a...
Secure transmission with error correcting code
The invention concerns a method and a system for encoding digital data (DATA) represented by source symbols, with an error correcting code generating parity...
Control word obfuscation in secure TV receiver
A device for descrambling encrypted data includes a descrambler, a secure link, and a secure element that securely transmits a control word to the descrambler...
Providing virtual networks using multi-tenant relays
Embodiments are directed to providing a multi-tenant relay service that securely relays data between computer systems. A computer system receives a portion of...
Dynamic partitioning of applications between clients and servers
Optimization mechanism that dynamically splits the computation in an application (e.g., cloud), that is, which parts run on a client (e.g., mobile) and which...