At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-1,021,2860 |
Adaptive automatic computer room air conditioners (CRAC) master control
method and system Described is an adaptive automatic computer room air conditioner (CRAC) or computer room air handler (CRAH, CRAC and CRAH is referred interchangeably in this... |
US-1,021,2851 |
Data center air duct system An air duct system is configured to be used with an air containment system that spans an aisle defined by rows of racks. The air duct system includes a... |
US-1,021,2761 |
Systems for improved multi-channel network connectivity performance and
security Systems and methods that efficiently combine multiple wireless networks or devices resulting in faster, more reliable, and more secure mobile Internet. A... |
US-1,021,2585 |
System and method for wireless network access protection and security
architecture Wireless network specific (WN-specific) key can be used to provide access protection over the radio access link. A WN-specific key may be associated with (or... |
US-1,021,2404 |
Projection mapping system and apparatus A projection system includes a projection apparatus embodied in a housing secured to a user. The projection apparatus has a processor in data communication with... |
US-1,021,2272 |
Near field communication enhanced computing systems Technologies are disclosed herein for utilizing near field communication ("NFC") to improve the security, performance, and configuration of computing systems.... |
US-1,021,2186 |
Systems and methods for attack simulation on a production network The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of... |
US-1,021,2177 |
System and method for managing terminal The present invention is to provide a system and a method for managing a terminal to improve the security. The system for managing a terminal 1 connects to a... |
US-1,021,2174 |
Method and system for reviewing identified threats for performing computer
security monitoring A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security... |
US-1,021,2169 |
Enforcing data security in a cleanroom data processing environment Techniques for enforcing data security in a cleanroom data processing environment are described herein. In one or more embodiments, a virtual private cloud... |
US-1,021,2168 |
Electronic device and control method thereof An electronic device and a control method thereof are provided. The control method for the electronic device includes: acquiring a call instruction; calling a... |
US-1,021,2165 |
Secured vital sign data group streams A method and system for securely transmitting a plurality of data streams between a client device and a server that are in communication via standard Internet... |
US-1,021,2153 |
Providing data security with a token device A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having... |
US-1,021,2134 |
Centralized management and enforcement of online privacy policies Systems and methods for centralized management and enforcement of online privacy policies of a private network are provided. According to one embodiment,... |
US-1,021,2133 |
Accelerated pattern matching using pattern functions System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed... |
US-1,021,2132 |
Systems and methods for accelerated pattern matching System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed... |
US-1,021,2129 |
Network interface card rate limiting Systems and methods for limiting the rate of packet transmission from a NIC to a host CPU are provided. According to one embodiment, data packets are received... |
US-1,021,1992 |
Secure certificate pinning in user provisioned networks Embodiments are directed to a system and method of exchanging certificate pinning information between a server and client over an unprotected network by:... |
US-1,021,1991 |
Method for downloading preauthorized applications to desktop computer
using secure connection A method and computer program product for establishing a connection and downloading server applications on a desktop. A user downloads and installs custom... |
US-1,021,1989 |
Trusted indicators to secure visual outputs Providing secure graphics outputs by performing at least the following: receive secure output data corresponding to a digital image, obtain one or more security... |
US-1,021,1978 |
Data security in a disconnected environment Systems and methods are provided for the detection and prevention of intrusions in data at rest systems such as file systems and web servers. The systems and... |
US-1,021,1975 |
Managed secure computations on encrypted data The subject disclosure is directed towards secure computations of encrypted data over a network. In response to user desired security settings with respect to... |
US-1,021,1969 |
Secure system for the synchronized collection and distribution of
transactional messages among untrusted... A method and arrangement for the coordinated, distributed, and linearly ordered collection and publication of event streams (i.e. time series data) includes... |
US-1,021,0717 |
Detecting RF transmission from an implanted device in a POS terminal Various embodiments are configured to detect a foreign object that has been implanted into or onto a device, such as a secure POS terminal. The implanted object... |
US-1,021,0683 |
Physical condition based intelligent house security system Embodiments of the present invention disclose a method, computer program product, and system for determining a security level for accessing a restrictive area.... |
US-1,021,0516 |
Mobile devices for commerce over unsecured networks Techniques for managing modules or applications installed in a mobile device are described. To provide authentic and secured transactions with another device,... |
US-1,021,0477 |
Multi-tenant multi-user multi-airline cargo consolidation and processing
center A multi-tenant multi-user multi-airline cargo consolidation and processing center for processing cargo with an enclosed high security small footprint... |
US-1,021,0470 |
Pervasive, domain and situational-aware, adaptive, automated, and
coordinated big data analysis, contextual... Real time security, integrity, and reliability postures of operational (OT), information (IT), and security (ST) systems, as well as slower changing security... |
US-1,021,0388 |
Biometric template security and key generation Methods and systems for securing biometric templates and generating secret keys are provided. One or more images are received. Interest points are identified... |
US-1,021,0375 |
Mouse with embedded camera and embedded microphone for active biometric
authentication The invention provides a device and a method for frequent verifications of the identity of a user performed during a long session of client-server communication... |
US-1,021,0349 |
Data processing apparatus and method using secure domain and less secure
domain A data processing apparatus has processing circuitry which has a secure domain and a less secure domain of operation. When operating in the secure domain the... |
US-1,021,0341 |
Delayed data access A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by... |
US-1,021,0333 |
Secure industrial control platform According to some embodiments, an overall chain-of-trust may be established for an industrial control system. Secure hardware may be provided, including a... |
US-1,021,0323 |
Information assurance system for secure program execution An enhanced information assurance system may comprise an improved computer including a central processing unit (CPU) emulator configured to extend the available... |
US-1,021,0266 |
Database query processing on encrypted data Methods, systems, apparatuses, and computer program products are provided for secure handling of queries by a data server and a database application. A... |
US-1,021,0101 |
Systems and methods for flushing a cache with modified data Systems and methods for flushing a cache with modified data are disclosed. Responsive to a request to flush data from a cache with modified data to a next level... |
US-1,021,0085 |
Leveraging non-volatile memory for persisting data Data temporarily stored in volatile memory (e.g., RAM) on a host machine can be protected using a component such as an NV-DIMM, which includes components such... |
US-1,020,9932 |
Printing apparatus that processes print data based on security setting
data A printing apparatus includes a data storage, a first printer, a communication interface, and a controller. The controller is configured to determine a security... |
US-1,020,9907 |
Secure removal of sensitive data Representative embodiments disclose how to remove spilled data from an unauthorized system and/or service in a cloud service. Some embodiments allow a user to... |
US-1,020,9795 |
Method for transmitting data A data transmission method may include receiving identification (ID) information from a data transmission device. The method may also include receiving encoded... |
US-1,020,9366 |
Method and apparatus for wireless communication in wireless communication
system The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates... |
US-1,020,6323 |
Plant by plant harvester A plant by plant harvester is provided. The harvester may harvest and analyze single or double rows of crops. The single row harvester may have a first and a... |
US-1,020,6303 |
Universal aisle containment column adapter An aisle containment system installed around a pre-existing building column in a data center. The aisle containment system includes a frame defined by wall... |
US-1,020,6107 |
Secure offline data offload in a sensor network Methods and systems for secure data offload in a sensor network. The method comprises offloading data indicative of sensor measurements from a wireless sensing... |
US-1,020,6106 |
Methods and apparatus for delivering electronic identification components
over a wireless network Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or... |
US-1,020,6103 |
Method and system to provide secure exchange of data between mobile phone
and computer system Systems and methods of providing a secure access layer in a mobile phone and a computer system coupled to the mobile phone to provide authentication for... |
US-1,020,5795 |
Optimization of enhanced network links A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a... |
US-1,020,5748 |
Protection for computing systems from revoked system updates A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security... |
US-1,020,5747 |
Protection for computing systems from revoked system updates A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security... |
US-1,020,5745 |
Method for addressing, authentication, and secure data storage in computer
systems A method which facilitates the secure addressing and authentication for the establishment of connections as well as the secure storage of data and the avoidance... |