At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-1,012,9273 |
System and methods for computer network security involving user
confirmation of network connections Systems and methods for detecting anomalies in network traffic and providing notification to the users of the computers that generated the network traffic for... |
US-1,012,9254 |
Automated provisioning of a network appliance Certain embodiments disclose a method of provisioning security services for a domain or set of domains. The method comprises sending an electronic message to... |
US-1,012,9244 |
Securing computing resources Various examples are directed to systems and methods for providing access to computing resources. A resource system may receive an access request from a first... |
US-1,012,9238 |
System for control of secure access and communication with different
process data networks with separate... A distributed block chain network having at least a private block chain portion, and in some cases a public block chain portion, allows users to take actions... |
US-1,012,9237 |
System and method invoking security and profile utilities for global
account registration Systems and methods are disclosed herein for managing electronic access from remote devices to a plurality of back-end computer platforms. The system includes a... |
US-1,012,9233 |
Method, device and system for network-based remote control over
contactless secure storages A typical system environment comprises a terminal device, a secure storage subsystem, and an interconnectivity component. The terminal device has a network... |
US-1,012,9229 |
Peer validation The present disclosure describes systems and methods for authenticating a called party during the initialization stage of establishing a secure ... |
US-1,012,9228 |
Authenticated communication between devices Various examples are directed to systems and methods for establishing a secure, authenticated connection between devices utilizing a password authenticated key... |
US-1,012,9222 |
Trusted storage systems and methods Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of... |
US-1,012,9219 |
Methods and systems for securing data stored at a storage area network Methods and systems for securing data are provided. For example, one method includes providing context information for an input/output (I/O) operation to a... |
US-1,012,9214 |
System and method for secure communication between domains A system and method of executing secure communications between first and second domains includes a first logical unit and a second logical unit. The first... |
US-1,012,9212 |
Computation of historical data Secure computation of enterprise data in a cloud is provided, by a third party, such that values and data manipulation processes are encrypted through use... |
US-1,012,9211 |
Methods and/or systems for an online and/or mobile privacy and/or security
encryption technologies used in... A method, apparatus, computer readable medium, computer system, wireless or wired network, or system to provide an online and/or mobile security of a user's... |
US-1,012,9197 |
Computerized system and method for modifying a message to apply security
features to the message's content Disclosed are systems and methods for improving interactions with and between computers in content providing, generating and/or hosting systems supported by or... |
US-1,012,9117 |
Conditional policies Conditional policies can be defined that change based on security measurements of network endpoints. In an example embodiment, a network traffic monitoring... |
US-1,012,9023 |
Enhancing security for multiple storage configurations A method begins by a processing module identifying, for a DSN (Dispersed Storage Network) memory using multiple IDA (Information Dispersal Algorithms)... |
US-1,012,7989 |
Semiconductor device An object of the present disclosure is to provide a semiconductor having high security. A semiconductor device includes: a memory region having a plurality of... |
US-1,012,7926 |
Securely executing voice actions with speaker identification and
authentication input types In some implementations, (i) audio data representing a voice command spoken by a speaker and (ii) a speaker identification result indicating that the voice... |
US-1,012,7785 |
Entry point opening sensor A sensor package is disclosed that includes a compass and/or an accelerometer. The compass may be activated by a microcontroller in response to an indication of... |
US-1,012,7748 |
System having a mobile key unit A system having a mobile key unit (2) for reading and writing data from at least one external device (3) of a facility (4), wherein the data at least comprise... |
US-1,012,7740 |
Inspection apparatus, inspection system, and inspection method There are provided an inspection apparatus, an inspection system, and an inspection method capable of inspecting operation of a control device, accurately,... |
US-1,012,7611 |
Method and system for requesting a reservation for a set of contract
rights to be offered A method and system for the determination of optimal pricing and allocation of securities in an open, competitive environment. The method and system may also be... |
US-1,012,7562 |
Method and apparatus for maintaining high data integrity and for providing
a secure audit for fraud prevention... Any of various comparisons of computer folders from different points in time is performed. Such comparisons provide the ability to discover missing documents or... |
US-1,012,7397 |
Method for strongly encrypting .zip files The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data... |
US-1,012,7392 |
Secure rendering system that generates ray tracing samples with obfuscated
position data Secure rendering system that creates ray tracing samples with obfuscated positions, so that images can only be viewed by an authorized consumer able to recover... |
US-1,012,7389 |
Performing operations on intelligent storage with hardened interfaces A storage device can include processing and cryptographic capability enabling the device to function as a hardware security module (HSM). This includes the... |
US-1,012,7385 |
Automated security vulnerability exploit tracking on social media Embodiments automate tracking of exploit information related to initially-identified security vulnerabilities, through the data mining of social networks.... |
US-1,012,7383 |
Resource usage optimized auditing of database shared memory A system, and computer program product for security auditing of database transactions are provided in the illustrative embodiments. For a specified period, an... |
US-1,012,7172 |
Single SDIO interface with multiple SDIO units A system and method communicates with one of two or more secure digital input output (SDIO) units that only one SDIO unit responds when it is being addressed.... |
US-1,012,7022 |
Tools and methods for real-time dataflow programming language A dataflow programming language can be used to express reactive dataflow programs that can be used in pattern-driven real-time data analysis. One or more tools... |
US-1,012,6961 |
Securely recovering stored data in a dispersed storage network A method for execution by a dispersed storage and task (DST) execution unit that includes a processor includes receiving a slice pre-image request from a... |
US-1,012,6832 |
Split rotating keyboard system A split rotating keyboard system for use in easing muscle strain and mitigating the effects of carpal tunnel syndrome associated with the usage of conventional... |
US-1,012,3703 |
Health monitoring apparatus with wireless capabilities for initiating a
patient treatment with the aid of a... Individuals who suffer from certain kinds of medical conditions, particularly conditions that only sporadically exhibit measurable symptoms, can feel helpless... |
US-1,012,3360 |
System and method for secure wireless communication A system and method for secure wireless communication for transferring or sharing data between at least two devices over a wireless network. A set of pictures... |
US-1,012,3213 |
Methods and devices for securing radio resources for an LTE-U data
transmission A method for securing radio resources for a Long Term Evolution-unlicensed, LTE-U, data transmission is disclosed. The method includes transmitting a plurality... |
US-1,012,2985 |
Camera based safety mechanisms for users of head mounted displays The disclosure provides methods and systems for warning a user of a head mounted display that the user approaches an edge of field of view of a camera or one or... |
US-1,012,2900 |
Camera mounting device A web cam device includes a camera housing, a camera disposed in the camera housing, a data cable coupled to the camera that extends from the camera housing,... |
US-1,012,2888 |
Information processing system, terminal device and method of controlling
display of secure data using augmented... An information processing system includes a server, and a terminal device communicable with the server via a network. The terminal device includes a display, an... |
US-1,012,2766 |
Policy-based secure containers for multiple enterprise applications Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy... |
US-1,012,2764 |
Multi-factor and context sensitive biometric authentication system This disclosure describes techniques that facilitate granting an access privilege to a client device based on selectively authenticating biometric data.... |
US-1,012,2746 |
Correlation and consolidation of analytic data for holistic view of
malware attack In communication with security appliances, an electronic device for providing a holistic view of a malware attack is described. The electronic device features... |
US-1,012,2745 |
Heuristics-based identification of IoT (internet of things) attacks in
Wi-fi Attacks from IoT (Internet of Things) devices (or other statins) on a Wi-Fi network are identified using heuristics. Frames are detected from an IoT device (or... |
US-1,012,2740 |
Methods for establishing anomaly detection configurations and identifying
anomalous network traffic and devices... A method, non-transitory computer readable medium, and network security apparatus that monitors received network traffic to obtain signal data for signals... |
US-1,012,2739 |
Rootkit detection system and method A rootkit detection method includes obtaining, from a target system, first data comprising raw data stored in a data block of a storage drive, checking the... |
US-1,012,2737 |
Local area network ecosystem of verified computer security resources A router-level computer security component validates multiple endpoint computer security components on multiple endpoint devices in a local area network, based... |
US-1,012,2734 |
Secure email verification service Concepts and technologies are disclosed herein for providing and using a secure email verification service. A processor can receive verification data and... |
US-1,012,2716 |
Secure storage device with on-board encryption control A communication and security device for a portable computer having an interface for connecting the security device to a host device to enable the security... |
US-1,012,2713 |
Method and device for the secure authentication and execution of programs A device and a method for encrypting a virtual machine by on-the-fly encryption and decryption of the memory is described. The device comprises hardware and... |
US-1,012,2694 |
LPI/LPD communication systems In a wireless communication system, a secure communication link is provided by selecting a decoy data signal vector for transmission, generating a MIMO... |
US-1,012,2693 |
Protocol based key management A method, system, and computer usable program product for protocol based key management are provided in the illustrative embodiments. A key management protocol... |