At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for securing data through a PDA portal
Consumers may utilize computing devices to assist in the purchase and/or loyalty process, and in particular, the consumer may utilize a PDA to facilitate the...
Dynamic electric power line monitoring system
A device and method of precise distance measurement of a transmission line to any object below it is disclosed, along with a network of such devices. The...
Methods and systems for securing vehicle data
A method for securing vehicle data that includes a plurality of data messages includes the steps of determining a sequence for the plurality of data messages,...
Method and system for global navigation satellite system configuration of
wireless communication applications
Methods and systems for global navigation satellite system configuration of wireless communication applications may comprise determining a location of a...
Cellular device security apparatus and method
A cellular communication device has one or more access modes which allow reading and writing of data, for example to change its settings, for example passwords...
Interactive personal surveillance and security (IPSS) systems and methods
Embodiments relating to an interactive personal surveillance and security (IPSS) system are provided for one or more users carrying one or more respective...
Secure email communication system
The present invention provides a method and system for securing a digital data stream. A first key of a first asymmetric key pair from a key store remote from a...
Securely providing secret data from a sender to a receiver
The invention provides a system and a method for securely providing a secret data from a sender to one or more receivers. The receiver uses a sequence of...
Secure key distribution for optical code division multiplexed based
An optical communications network incorporating photonic layer security, with secure key exchange without loss of data, and a method of operating the network...
Encryption device and medium, decryption device and method, data delivery
device, data receiving device, and...
A data delivery device divides data representing a single entity into a plurality of data items, encrypts the data items, and delivers the encrypted data items...
Exponential data transform to enhance security
A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a...
Cryptographic processing apparatus, cryptographic processing method, and
To realize a common-key block cipher process configuration with increased difficulty of key analysis and improved security. In a configuration for storing in a...
Route optimization of a data path between communicating nodes using a
route optimization agent
The invention relates to optimizing a data path between two communication nodes. A route optimization agent (ROA) is determined in the current network of the...
Optical scanner that forms an optical path for an image light emitted from
a light source, and image forming...
An optical scanner contains in a casing made of thermoplastic material a light source that emits an image light based on image data, and at least one optical...
Printing and authentication of a security document on a substrate
utilizing unique substrate properties
A method for printing a security document on a substrate is disclosed. Firstly, a first reference image of a reference region of the substrate is generated, the...
Method and system for cryptographically securing a graphics system
A system and method for cryptographically securing a graphics system connectable via an external bus to a computing system, the graphics system including a...
Microprocessor controlled security tag
A microprocessor controlled security tag and accompanying security system is described. The tag generally includes a housing having external contacts to...
Setting security features of programmable logic devices
Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated...
Electronic device with bezel assembly
A bezel assembly includes a panel, a shielding member, and a securing member. The panel includes a main body. The main body defines a through hole and a first...
System, method and computer program product for facilitating secure
A secure financial transactions system generally includes a card that can be used a credit card, ATM card or debit card having a personal identification number...
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
Banking system controlled responsive to data bearing records and user
input of a phone received security code
A banking system operates to cause financial transfers responsive to card data read from data bearing records by a card reader. The system includes at least one...
System and method for securing data to be protected of a piece of
A system and method for securing data to be protected of a piece of equipment are provided. The equipment comprises: a space; at least one device for processing...
Cross-domain security for data vault
A secure database appliance leverages database security in a consistent framework provides consistent, flexible, and adaptable security using mandatory access...
System and method for monitoring and securing a baseboard management
In certain embodiments, a method for monitoring and securing a baseboard management processor is provided. The method includes coupling to a baseboard...
Smartphone security system
System for protecting a mobile device against malware or harmful communications via calls and SMSs. A security module for a personal mobile device protects the...
Method and apparatus for exchanging data between a user equipment and a
core network via a security gateway
The present invention concern a methods and an apparatus for exchanging data between a user equipment and a core network via a security gateway. The invention...
Method and system for securing data from an external network to a non
point of sale device
A data control system allows non-point of sale devices (135, 155) on the LAN to receive data from an external network (160) when established conditions are met....
Method of operating an item of on-board equipment, associated equipment
and aircraft comprising such equipment
Equipment items installed on board vehicles and more particularly to a method for operating such an on-board equipment item, the method including an on-board...
Re-authentication in secure web service conversations
Techniques are disclosed for sharing communication session information, such as encryption keys for data protection, among multiple communication operations...
Method and system for improving security of the key device
The present invention provides a method and a system for improving security of a key device in the information security filed. In order to solve the problem...
Non-symbolic data system for the automated completion of forms
A system and method for paper-based, automated completion of forms allows a user charged with filling out multiple forms containing some common information to...
Data processing apparatus and method for analysing transient faults
occurring within storage elements of the...
A data processing apparatus has a plurality of storage elements residing at different physical locations within the apparatus, and fault history circuitry for...
Data communication method, computer and information storing medium
A computer including at least two processors is used to preferably perform a secure data communication. Data containing a processor ID identifying one of the at...
Methods and apparatus for secure data sharing
This disclosure relates to methods and apparatus for securely and easily sharing data over a communications network. As communications services on a...
Security system for handheld wireless devices using time-variable
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time...
Secure acknowledgment device for one-way data transfer system
An apparatus for relaying a hashed message from a first node to a second node, comprising an inlet interface for receiving a message from the first node, a hash...
Information processing device, information processing method, information
processing program, and integrated...
An information processing terminal includes first sealed data respectively having usability conditions of matching with predetermined terminal environment...
Method and system for hardware-based security of object references
A method for managing data, including obtaining a first instruction for moving a first data item from a first source to a first destination, determining a data...
Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
Security in a geo-spatial environment
A method, apparatus, and system of security in a geo-spatial environment are disclosed. In one embodiment a privacy server verifies that each user of the...
Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
A method for receiving, processing and managing service requests from a user is disclosed. The method includes receiving the service request from a user at a...
Inertial sensor calibration method for vehicles and device therefor
An inertial sensor calibration method has steps of mounting an observer device and an inertial sensor of a vehicle carrying on an inertial move, acquiring...
System of automated document processing
A system is proposed for automated document processing, comprising a document, consisting of two sections--a main section, containing data in printed character...
System and method for providing voice communications over a multi-level
According to one embodiment, a communication network includes an analog voice bridge coupled to two secure network domains that each have a differing security...
Systems, methods, and apparatus for monitoring and alerting on large
sensory data sets for improved safety,...
The present invention is a process monitoring method, comprising the steps of capturing sensory data from one or more sensors; storing the sensory data from the...
Structure for railroad ties having data acquisition, processing and
An encapsulated railroad tie structure and its method of manufacture. A core of laminated wood slats is inserted into an extruded sleeve of scrap tire rubber...
Varnish printing document securing system and method
A paper and document securing system that includes an indicator is used to for validating the paper. The indicator may be printed on a surface of the paper by a...
Techniques for providing security using a mobile wireless communications
device having data loss prevention...
A technique provides wireless communications security. The technique involves providing a mobile wireless communications apparatus (e.g., a smart phone) having...