At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-1,011,0570 |
Providing load balanced secure media content and data delivery in a
distributed computing environment A system and method for providing load balanced secure media content and data delivery in a distributed computing environment is disclosed. Media content is... |
US-1,011,0527 |
Systems and methods for secure data exchange in a distributed
collaborative application A collaborative communication system that includes a plurality of endpoints and interconnecting nodes configured to communicate via messages over... |
US-1,011,0380 |
Secure dynamic on chip key programming Provisioning an integrated circuit with confidential data, by receiving in the integrated circuit encrypted confidential data, the encrypted confidential data... |
US-1,011,0379 |
System and methods for permitting open access to data objects and for
securing data within the data objects A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the... |
US-1,011,0322 |
Secure open-air communication system utilizing multichannel decoyed
transmission A secure communication system utilizes multiple "decoy" data signals to hide one or more true data signals. The true data signal(s) are encrypted, and received... |
US-1,011,0163 |
Security and tracking systems including energy harvesting components for
providing autonomous electrical power A security system is provided that integrates a unique set of structural features for concealing self-powered sensor and communication devices in aesthetically... |
US-1,010,9230 |
Systems and methods for storing digital content System and method for storing digital content for display on a display device, comprising at least one digital content item, configured to be displayed on the... |
US-1,010,9171 |
Systems and methods for performing security actions based on people's
actual reactions to interactions The disclosed computer-implemented method for performing security actions based on people's actual reactions to interactions may include (i) detecting an... |
US-1,010,9142 |
System and method for selective encryption of input data during a retail
transaction A retail environment having retail terminals with data entry point devices selectively encrypts input received by the data entry point devices and passes the... |
US-1,010,9124 |
Method, system and device for securing and managing access to a lock and
providing surveillance A method for commissioning a collection of electronic locks by inserting the same electronic key into each of the locks and recording in the electronic key and... |
US-1,010,9009 |
Systems and methods regarding targeted dissemination One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data... |
US-1,010,8956 |
Methods and systems for using physical payment cards in secure E-commerce
transactions Methods and systems for conducting a secure online transaction with a payment card are described. In an embodiment, a user selects a secure payment option... |
US-1,010,8924 |
Methods and apparatus to emulate a toy Methods, apparatus, systems and articles of manufacture to emulate a toy are disclosed. An example method includes identifying a toy to be emulated by a mobile... |
US-1,010,8900 |
Jewelry with security bezel for regulating near field communication with
an embedded near field communication chip An article of jewelry comprising a precious or semi-precious gem; a near field communication (NFC) chip; and a bezel, wherein the bezel comprises an... |
US-1,010,8875 |
Information processing device, information processing method, information
processing program, and recording medium An image processing device configured to process image data obtained externally, the image processing device including a preprocessing circuit configured to... |
US-1,010,8816 |
Remote data viewer A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and... |
US-1,010,8813 |
Query conditions-based security A system and article of manufacture for managing access to queries and, more particularly, for managing access by multiple users to persistently stored queries.... |
US-1,010,8811 |
Dynamic secure interactive electronic vault Disclosed herein is a system for enabling secure data storage into a third party managed electronic vault that provides users with a secure location to store... |
US-1,010,8810 |
System and method for secure document embedding The example non-limiting technology herein uses a Microsoft Office module or other application that automatically encrypts an Office document (Excel,... |
US-1,010,8807 |
Secure data parser method and system A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data... |
US-1,010,8799 |
Resource usage optimized auditing of database shared memory A method for security auditing of database transactions is provided in the illustrative embodiments. For a specified period, an available capacity of a... |
US-1,010,8796 |
System and method for PIN entry on mobile devices A system for entering a secure Personal Identification Number (PIN) into a mobile computing device includes a mobile computing device and a peripheral device... |
US-1,010,8614 |
Document handling in a web application A unique document handling facility on the scale of a Lotus Notes document. Preferably, the documents are stored in a relational database and served-up using... |
US-1,010,8435 |
Short message service security for zero touch deployments Presented herein are techniques for enabling the zero touch deployment of devices having an integrated wireless wide area network (WWAN) interface. In one... |
US-1,010,8181 |
Motor drive system data interface system and method A motor drive system includes a motor drive processor, a motor drive memory component, a server, and a display that displays a machine readable code, wherein... |
US-1,010,7014 |
Security system with anti-tampering sensors and cybersecurity The disclosed embodiments include a method for tamper-proof protection of containers used for shipment of goods. The system contains a lock with electronic and... |
US-1,010,5982 |
Security element having a lenticular image A security element for securing security papers, value documents and other data carriers, has a lenticular image that, from different viewing directions,... |
US-1,010,5108 |
First responder dispatch system and methods of operation thereof A first responder dispatch system is disclosed comprising a sensing wearable configured to be worn by a first responder. The sensing wearable can comprise a... |
US-1,010,4796 |
Data storage securing device A data storage securing device configured to receive a data storage comprises a shell, a bracket slidably installed in the shell, and a locking module. The... |
US-1,010,4567 |
System and method for event based internet of things (IOT) device status
monitoring and reporting in a mobility... Protocol agnostic wrapping (PAW) and/or data analytics engine (DAE) functions are embedded within a service capability exposure function (SCEF) entity for... |
US-1,010,4433 |
Display apparatus, broadcast signal receiving apparatus and control
methods thereof A display apparatus, a broadcast signal receiving apparatus and methods thereof are provided. The display apparatus includes a signal receiver configured to... |
US-1,010,4152 |
Inter-application communication and integration broker A system for intermediated communication between applications running on the same computer is presented. The system routes communication between a first... |
US-1,010,4122 |
Verified sensor data processing Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example,... |
US-1,010,4114 |
Method and apparatus for testing a security of communication of a device
under test A test apparatus for testing a security of communication of a device under test, DUT, wherein the test apparatus comprises an RF unit having an RF interface... |
US-1,010,4113 |
Using machine learning for classification of benign and malicious webpages In an embodiment, a data processing method providing an improvement in computer security, comprises selecting a uniform resource location (URL) for... |
US-1,010,4102 |
Analytic-based security with learning adaptability An analytics-based security monitoring system is adapted to receive data, such as in the form of event logs, from one or more network devices transferred... |
US-1,010,4101 |
Method and apparatus for intelligent aggregation of threat behavior for
the detection of malware Embodiments disclosed herein are directed to intelligent malware detection. A scanner server is used to scan an endpoint device for malware. Various attributes... |
US-1,010,4074 |
Independent biometric identification system The inventive data processing system and method enable verifiable secure transfer of information between two or more parties, each having access to at least one... |
US-1,010,4059 |
Secure permissioning of access to user accounts, including secure
deauthorization of access to user accounts A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate... |
US-1,010,4046 |
Content distribution systems and methods A content dispensing device includes memory storing one or more executable programs, each of the programs compatible with a respective operating system, each... |
US-1,010,4045 |
Verifying data security in a dispersed storage network An integrity record is appended to data slices prior to being sent to multiple slice storage units. Each of the data slices includes a different encoded version... |
US-1,010,4042 |
Security policy management A method performed by a computing system includes, with a computing system, receiving an application and a security policy corresponding to the application, the... |
US-1,010,4029 |
Email security architecture A method for filtering unsolicited emails may comprise dynamically aggregating historical email data associated with a user or a group of users and dynamically... |
US-1,010,3912 |
Phased information pulse method and apparatus Data communication/transfer has been in binary form from the first simple service through today's complex internet systems. Binary uses zeros and ones... |
US-1,010,3900 |
Network security analysis for smart appliances A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows... |
US-1,010,3889 |
Securely exchanging vehicular sensor information Technologies for securely exchanging sensor information include an in-vehicle computing system of a vehicle to establish a trusted execution environment and a... |
US-1,010,3879 |
Secure data upload/download service A first device may receive data, to be provided to a second device, and an application identifier. The data and application identifier may be received from a... |
US-1,010,3800 |
Method and apparatus for adaptive beam hopping in multi cell multi user
communication system The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates... |
US-1,010,2524 |
Access control and mobile security app An illustrative apparatus includes a memory, a processor coupled to the memory, and a first set of instructions stored on the memory that can be executed by the... |
US-1,010,2462 |
Optically variable data storage device An optically variable device uses a data storage layer with a nano-optical bit system to store data. The optically variable device encodes the data using... |