At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Computer system and volume migration control method using the same
A computer system regarding which there is no possibility that data loss or data leakage will occur caused by volume migration is provided. The computer system...
Method and system for establishing security connection between switch
A method and a system for establishing a security connection between switch equipments are disclosed in the present invention. The system includes the first...
Firewall-tolerant voice-over-internet-protocol (VoIP) emulating SSL or
HTTP sessions embedding voice data in...
A voice-over-Internet-Protocol (VoIP) client codes audio data as printable ASCII characters, then embeds the ASCII audio data inside a cookie that is sent over...
Secure Flash-based memory system with fast wipe feature
A Flash-based storage system, card, and/or module comprises a Flash controller configured to encrypt the data pages of a page stripe by shuffling the data...
Media processing method and device
A media processing system and device with improved power usage characteristics, improved audio functionality and improved media security is provided....
Mobile interactive kiosk method
To regulate information exchanges, provide personal security and enhance personal privacy inside and outside a network and to regulate devices. Provided is a...
Grid computing accounting and statistics management system
Performance data is captured periodically from resources and groups of resources in a grid computing environment and stored in a content-addressable data...
Device for data routing in networks
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
System and method for investing public deposits
A method, system and program product for operating an exchange method for municipal and/or state funds from banking institutions, comprising: accessing, one or...
Method and system for electronic distribution of product redemption
Provided is a method and system for the electronic distribution of product redemption coupons to remote personal computers located at users' homes. A centrally...
Method and system for dynamically representing distributed information
Techniques for dynamically representing distributed information are disclosed. According to one embodiment, metrics for deployed resources in a predefined...
Computer program, system, and method for mapping Social Security claiming
A non-transitory computer readable medium having a computer program stored thereon for directing operation of a processor. The computer program receives...
Multi-user remote health monitoring system with biometrics support
The invention presents a networked system for identifying an individual, communicating information to the individual, and remotely monitoring the individual....
System and method for access of user accounts on remote servers
In certain embodiments, the system of the invention automatically replicates a user's personal computing environment and provides associated remote server...
Multiple secure elements in mobile electronic device with near field
A method of managing data communication network inventory is provided. The method comprises analyzing a plurality of separate data stores, the data stores...
System for the secure management of digitally controlled locks, operating
by means of crypto acoustic credentials
The invention relates to a system that makes use of a mobile telephone (22) to which a user authorized to open a lock (28) has access. According to the...
Analysis, secure access to, and transmission of array images
Systems and methods are provided the autocentering, autofocusing, acquiring, decoding, aligning, analyzing and exchanging among various parties, images, where...
Method for detecting security error in mobile telecommunications system
and device of mobile telecommunications
According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving, by a packet data...
Method and system for security authentication of radio frequency
A method and system for security authentication of radio frequency identification are disclosed. All the security control in this method is completed by the...
System and method for secure power systems infrastructure communications
Communication apparatus and associated method for sending messages while concealing the messages among chaff data. In sending outgoing communications to and...
Implicit certificate scheme
A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted...
Visual physician office systems and methods
Methods and systems are disclosed for enabling a virtual physician office (VPO) that uses a network-based physician practice application and leverages the...
Method and system for modularized configurable connector system for
A first modular Ethernet connector and a coupled corresponding second modular Ethernet connector may communicate data based on Ethernet standards. The Ethernet...
High performance data transport system and method
System and method for providing data transport Quality of Service (QoS) assurances in homogeneous and heterogeneous communication networks consisting of one or...
Flash memory apparatus and method for generating read voltage thereof
A flash memory apparatus includes: a cell array including a plurality of main blocks, a code addressable memory (CAM) block, and a security block; a control...
Data security for dynamic random access memory using body bias to clear
data at power-up
A circuit and method erase at power-up all data stored in a DRAM chip for increased data security. All the DRAM memory cells are erased by turning on the...
Modular microscope construction
A system, apparatus and method for using modular microscopes is disclosed. Connecting the housings of the individual microscope modules provide the structural...
Printing device, printing system, program, and printing method for
printing based on print data from a user...
There are provided a printing device, a printing system, a program, and a printing method capable of improving security and user-friendliness. The printing...
Secure data entry device
A secure data entry device including a housing, tamper sensitive circuitry located within the housing and tampering alarm indication circuitry arranged to...
Method of measuring specific absorption rate of electromagnetic waves
Disclosed is an SAR measurement method that is capable of securing sufficient power within a short period of time and always maintaining the intensity of...
Camera enclosure assembly
An enclosure assembly for a camera is designed to be mounted on the frame of an optical inspection apparatus for scanning the profile of a surface of an article...
Methods and systems for forcing an application to store data in a secure
The present application is directed to methods and systems for redirecting write requests issued by trusted applications to a secure storage. Upon redirecting...
Secure data management device
Methods, devices, and systems for managing sensitive data are provided. The management tool may be provided on a user input device, as opposed to being provided...
Secure distribution of media data
A technique for distributing media data in a secured fashion that mitigates unwanted or illegal copying/distribution of such data. An initial, degraded version...
Always-on virtual private network access
An application processor is electrically and logically decoupled from a wireless data network module so that it may go to sleep independently. A security...
Systems and methods for disease management
A computer-implemented diabetes management system is provided that supports enhanced security between a diabetes care manager in data communication with a...
Secure network computing
A host based security system for a computer network includes in communication with the network a credential host that is operative in concert with a local...
Computer workload management with security policy enforcement
A computer implemented method, data processing system, and computer program product for managing computer workloads with security policy enforcement. When a...
In a storage system which supports a redundant disk configuration, while securing fault tolerance, a longer drive access time as well as a drop in I/O...
Security provision for a subject image displayed in a non-secure domain
A data processing device is provided with a processor core 8 that can operate in either a secure domain or a non-secure domain. Data stored within a secure...
Establishing a secure memory path in a unitary memory architecture
A functional unit of a device is associated with a secret. Data stored in a memory location of the device is encrypted using the secret. The memory location of...
Cryptographic device with resistance to differential power analysis and
other external monitoring attacks
Techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device...
Method and system for embedded high performance reconfigurable firmware
A firmware cipher component is provided which can be configured and programmed to efficiently implement a broad range of cryptographic ciphers while...
Establishing secure communication between an implantable medical device
and an external device
Establishing secure communication between an implantable medical device and an external device includes: accessing, at the implantable medical device,...
Secure transfer of business data to a hosted system
A system and method for uploading data from a customer system to a hosted system is disclosed. A stub is integrated with a firewall between the customer system...
Multimedia communication control unit as a secure device for multimedia
communication between LAN users and...
A system and method for providing multimedia communication between a firewall protected, LAN based endpoint and an endpoint that is external to the LAN. A...
Sender managed message privacy
Embodiments of the present invention address deficiencies of the art in respect to securing the privacy of messages and provide a method, system and computer...
Client device systems and methods for providing secure access to
application services and associated client...
An extensible servicing hosting platform is provided that supports the design, build and concurrent deployment of multiple web accessible services on a services...
System and method for securely authorizing and distributing stored-value
A computerized system and method for securely authorizing and distributing stored-value card data over a communications network is provided. The method allows...
Systems and methods for electronically initiating and executing securities
Systems and methods are provided for conducting securities lending transactions using an electronic trading platform. In accordance with an implementation, the...