At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Apparatus and method of controlling seamless handover between
heterogeneous networks based on IPv6 over IPv4...
The invention relates to a method and an apparatus for controlling seamless handover between heterogeneous networks based on IPv6 over IPv4 tunneling. When IPv6...
System and method for implementing mesh network communications using a
mesh network protocol
The following describes data structures, communication protocol formats and process flows for controlling and facilitating secure communications between the...
DRAM security erase
In a method of erasing data, a wordline of the DRAM array is set active, and signals develop on bitlines according to flows of charge between memory cells...
Image generating apparatus, image processing apparatus, image forming
apparatus, and recording medium
Additional image data of an additional image, which is based on first data and second data concerning security of obtained data, is added to image data that is...
RFID remote antenna security system
An RFID remote antenna security system for preventing unauthorized reading of RFID cards. The RFID remote antenna security system generally includes a remote...
Systems and methods for providing security at a vehicle yard
Systems and methods for providing security at a vehicle yard are provided. A communicator may collect data associated with a plurality of vehicles or trailers...
System, device and method for securing a user device component by
authenticating the user of a biometric sensor...
A novel system, device and method of validation is provided for sensing a biometric such as a fingerprint, where biometric data corresponding to the biometric...
System and method for secure communication between domains
A method for secure communications between first and second domains where a first logical unit calculates timestamps and hashes and transmits web forms to a...
Method and system for providing network security services in a
An approach is provided for performing cloud based computer network security services. Security policies are established for each of a number of subscribers....
Method for information tracking in multiple interdependent dimensions
A method for information flow tracking is provided using, for example, a functional programming language based on lambda calculus, .lamda..sub.I. The method...
Method and computer program for securely storing data
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving...
Apparatus and method for securing data on a portable storage device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
Secure data deletion in a database
A data storage application encrypts one or more data pages using a first initialization vector and one or more encryption keys. In addition, the data storage...
A security system includes an interface, a main computer, and an application server. The interface enables a user to access a remote document related to a...
Apparatus and method for securing digital data with a security token
A security token includes a wireless interface to communicate with a secured device. A cryptographic module generates cryptographic information, encrypts...
Method and system for NAND flash support in an autonomously loaded secure
A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a...
Remote monitoring systems for monitoring medical devices via wireless
A remote monitoring system for monitoring a plurality of medical devices at a patient care or home care facility. The system includes a device integration...
Random number based data integrity verification method and system for
distributed cloud storage
A data integrity verification method and system based on a root random number to ensure secure distributed data storage on a public cloud. A new root random...
Smartcard-based value transfer
In a value transfer scheme, users are provided with programmable devices, for example, smart cards, capable of carrying data representing at least one available...
Integrated trading information processing and transmission system for
The present invention provides a system for processing and transmitting trading information incorporating (a) a risk analytic module using the latest market...
Methods, systems and securities for assuring a company an opportunity to
sell stock after a specified time
Various embodiments of the present invention relate to methods, systems and securities for assuring a company an opportunity to sell stock after a specified...
Using accounting data based indexing to create a low volatility portfolio
of financial objects
A system, method and computer program product creates an index based on accounting data, or a portfolio of financial objects based on the index where the...
System and method for providing handheld field force data gathering
automation in a big box retail environment
The present invention provides systems and methods for tracking service representative activity and data. Service representatives are equipped with handheld...
System and method for determining loss data based on industry indices
Systems and methods for evaluating basis risk associated with index based security instruments. The systems and methods calculating an element factor for each...
Performance monitoring devices and methods
We have disclosed devices and methods for monitoring an individual's performance during a physical activity. The devices may include multiple elements such as a...
Method and apparatus of performing video programming security control
Disabling data channels at a customer premises provides, in one embodiment, generating at least one jamming signal and inserting the at least one jamming signal...
Network security using optical attenuation data
A data processing device is connectable to a communication network and operable to receive data associated with an attenuation characteristic of a transmission...
Location brokering for providing security, privacy and services
Location brokering technique embodiments are presented that employ sensor data captured by a user's mobile device to determine the device's location, encrypt...
Methods, systems, and computer program products for implementing a custom,
interactive call flow
A custom call flow is implemented by receiving a sequence of user inputs provided as part of an interactive call between a caller requesting a service and a...
Systems and methods for the reliable transmission of facsimiles over
A method to efficiently and reliably guarantee delivery of fax documents not residing on the internet being transported through the internet to a non-internet...
Apparatus and method for assessing visual acuity
Disclosed is an apparatus and associated method an apparatus and method for assessing visual acuity of an image captured by a digital security camera. The user...
Methods for encoding and decoding data
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
Vibratory feedback systems and methods
Vibratory feedback systems and methods are disclosed. A vibratory feedback system includes a shoe adapted to be secured to a user's foot, a plurality of force...
Constant optical output illumination system
The present invention is an illuminator for CCTV surveillance and security applications that maintains constant optical output from an array of LEDs by...
Methods, systems, and products for security services
Methods, systems, and products notify of alarms in security systems. Sensor data is received from an alarm sensor, and an alarm condition is determined by an...
Security enabled medical screening device
Embodiments of the invention pertain to networked kiosks capable of providing enhanced health and/or entertainment and/or advertising information. In an...
Holding aid for a personal, hand-held, tablet-shaped device and methods of
A securement device to make it much easier for a user to securely hold onto a personal, hand-held, tablet-shaped device such as an electronic reader, a tablet...
Secure payment card transactions
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal,...
System and method for chip-enabled card transaction processing and alert
A system, method and computer program product is capable of proactive assessment of transactions and communication of alerts based on pre-set rules to increase...
Method and apparatus for accessing secure data in a dispersed storage
A method begins by a processing module receiving, from a user device, a request to access secure data, wherein the request includes a user identification code...
System and method for securely transmitting video data
Exemplary embodiments provide a system and method for securely transmitting video data to an electronic display. The video data may be transmitted using a wired...
Secure terminal, a routine and a method of protecting a secret key
The method of protecting a secret key from being read by a non-secure software application, comprises a step (94) of recording the secret key as a routine...
Tiered exposure model for event correlation
A method for real-time threat monitoring includes identifying two or more real time vulnerabilities, each associated with one or more objects of an enterprise,...
Image forming apparatus with hard disk drive securely formatted
If the validity of authorization information read from a USB key is verified (S1 to S4), use-information that indicates "used" is written in both of the...
Network security system
A method and system for preventing an unacceptable data packet directed at a computing device on a first network and sent from a client device. The method...
Trusted computing entities
The present invention relates to trust in computing platforms and the like. In particular, embodiments of the invention provide a trusted computing entity (64),...
Real time streaming data communications through a security device
An exemplary method of the invention is for connecting a plurality of clients to one another over a computer network for communication of real-time streaming...
Multiple independent authentications for enhanced security
A system and associated method for providing enhanced site access security by use of multiple authentications from independent sources. A security enhanced user...
Rule-based derived-group security data management
Methods for rule-based group security data management and corresponding systems and computer-readable mediums. A method includes receiving a complex rule set...
Security access control method and system for wired local area network
The present invention relates to a security access control method and system for wired local area network, the method includes the following steps: 1) a...