At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Apparatus and methods for provisioning subscriber identity data in a
Apparatus and methods for provisioning wireless devices for operation in one or more networks. In one embodiment, a provisioning service may provide access...
System for authorizing electronic communication of confidential or
proprietary data to external entities
A platform for providing authorization of electronic communication of secure data to external entities, e.g., vendors, third parties or the like based on an...
Secure destruction of storage devices
Techniques are provided for securely destroying storage devices stored in a data storage center. A server room may be situated in the data storage center that...
Intelligent motion capture element
Intelligent motion capture element that includes sensor personalities that optimize the sensor for specific movements and/or pieces of equipment and/or clothing...
System and method for a secure display module
A system for a secure display module includes a display element array, a driver controller, a communication interface, a host controller and a cryptographic...
Ballistic and impact protective military helmet assembly
A helmet assembly is provided including a front mount configured to attach to the front of the helmet above a brim of the helmet, a mandible for protecting a...
Interaction during delivery from aerial vehicle
An unmanned aerial vehicle (UAV) is disclosed that includes a retractable payload delivery system. The payload delivery system can lower a payload to the ground...
Hardening tokenization security and key rotation
A method of using a hardware security module and an adjunct application programming interface to harden tokenization security and encryption key rotation is...
Data processing device and method for interaction detection
The current invention discloses devices and methods that may be used for detection and verification of interactions, such as collisions, between objects in...
Hypervisor driven embedded endpoint security monitoring
Aspects of the present disclosure are directed to methods and systems of hypervisor driven embedded endpoint security monitoring. A computer implemented method...
Rapid data encryption and decryption for secure communication over open
channels with plausible deniability
Technologies are generally described for providing rapid data encryption and decryption for secure communication over an open channel with plausible...
Home automation communication system
A method for security and/or automation systems is described. In one embodiment, the method may include receiving occupancy data associated with a home. The...
Systems and methods for correlating data from IP sensor networks for
security, safety, and business...
Monitoring systems and methods for use in security, safety, and business process applications utilizing a correlation engine are disclosed. Sensory data from...
Secure smartphone-operated locking device
A gun trigger-locking device which is configured to be manually installed on a gun with a trigger-blocking member disposed behind the trigger to prevent the gun...
Global automotive safety system
A system for providing security to an in-vehicle communication network, the system comprising: a data monitoring and processing hub; and at least one module...
Vehicle security alarming system determining relative velocity between a
front car and a rear car by sounds...
A vehicle security alarming device determining a relative velocity between a front car and a rear car by sounds retrieved therefrom, comprising a vehicle noise...
NFC device configuration after device power up
A NFC tag includes an NFC controller, with a secure element coupled to the NFC controller. The secure element is to send first configuration data to the NFC...
Method and apparatus for visual monitoring
A device for visual monitoring comprises a mobile chipset disposed in a housing, at least one eyestalk attached to the housing and communicatively coupled to...
Secure nonscheduled video visitation system
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated...
Single element radiometric lens
The disclosure describes systems and apparatuses that include a focusable lens, as well as methods for focusing the optical lens. The focusable lens system...
System and method of providing secure data transfer
A system and method is provided for providing secure accelerated data transfer. The system may transparently provide accelerated data transfer between a client...
Cloud-based surveillance with intelligent tamper protection
In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively...
Method of DDoS and hacking protection for internet-based servers using a
private network of internet servers by...
A method of DDoS and hacking protection for internet-based servers using a private network of internet servers utilizes multiple data streams sent over a...
Method and system for remote data access using a mobile device
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
Methods and systems to implement fingerprint lookups across remote agents
The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect...
Method for providing a QoS prioritized data traffic
A method for transmitting data packets of a data traffic between a sending device (10, 80) and a receiving device (80, 10) via a VPN client (200) and a VPN...
Private electronic signature service for electronic documents
Techniques are disclosed for providing an electronic signature service where the content of an electronic document to be signed remains unknown to the service....
Cryptographically-secure packed proactive secret sharing (PPSS) protocol
Described is a system for implementing proactive secret sharing. The system uses a Secret-Share protocol to distribute, by a computing device, a block of secret...
User access control based on a graphical signature
A user inputs a pattern consisting of a plurality of lines. The lines are classified by relative length, overall direction and degree of curvature. Where a line...
Systems and methods for encryption and provision of information security
using platform services
Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in...
Secure network communications using hardware security barriers
One embodiment includes hardware-based cybersecurity devices that create a physical barrier ("hardware security barrier") between a computer's (or other...
Multi-layer transaction tracking and encryption
Embodiments for tracking multi-layer secured transactions include systems for providing a dedicated secure transaction channel to a user and sending...
Card-less payments and financial transactions
Payments and financial transactions are made without a physical card (and without a password). Payment information of a payer is functionally handicapped while...
A smartcard connector for connecting a smartcard within a card holder to an electronic device. The smartcard connector includes a card holder having a card...
Isolation and presentation of untrusted data
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application....
Electronic device, system and method for securing data
An electronic device capable of securing data is provided. The electronic device includes a storage device for storing data and a number of securing strategies....
Secure data parser method and system
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention...
Using telemetry to reduce malware definition package size
Clients send telemetry data to a cloud server, where the telemetry data includes security-related information such as file creations, timestamps and malware...
Systems and methods of secure data exchange
An example method for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment...
Efficient packet forwarding using cyber-security aware policies
For balancing load, a forwarder can selectively direct data from the forwarder to a processor according to a loading parameter. The selective direction includes...
Memory system and method for securing volatile memory during sleep mode
using the same ECC module used to...
In one embodiment, a memory system is provided comprising a volatile memory, a non-volatile memory, and an error correction code (ECC) module. The ECC module is...
Scheduled and secured cloud print services
Techniques are provided for processing scheduled and secured print requests. In one embodiment, a printing device receives a notification form a network service...
Wearable computing device for managing and storing data
The disclosed embodiments present a wearable computing device for storing and managing data. The wearable computing device includes a wristband including a...
Fluorescent security enabled ink for digital offset printing applications
An ink composition useful for digital offset printing applications comprises a fluorescent colorant and a plurality of curable compounds. The compounds have...
Supercritical fluid cleaning of banknotes and secure documents
A method and system for cleaning a secure instrument, such as a banknote, including a substrate, visual data and a security feature, including exposing the...
Method of manufacturing an arthroplasty jig
A method and system for performing a total joint arthroplasty procedure on a patient's damaged bone region. A CT image or other suitable image is formed of the...
Automatic reporting of prognosis data from wireless mesh sensors to cloud
A apparatus is provided that includes a plurality of wireless sensors arranged into a mesh network, wherein each of the plurality of sensors detects threats...
System and method for secure transmission of data signals
The present invention provides systems and methods for controlling signaling data transmitted over a communication system between a first party and a second...
Segmented networks that implement scanning
Systems for providing scanning within distributed services are provided herein. In some embodiments, a system includes a plurality of segmented environments...
System and method for software defined deployment of security appliances
using policy templates
A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual...