At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-1,014,8915 |
Lighting system with monitoring and alarm function The invention relates to the field of security, more particularly, to a lighting system with monitoring and alarm function. The illuminating module can supply... |
US-1,014,8761 |
System-on-chip data security appliance and methods of operating the same System-on-chip data security appliance ("SoC-DSA") and methods of operating the same. In one embodiment, the SoC-DSA includes data security mechanisms enclosed... |
US-1,014,8752 |
Enterprise level security orchestration Enterprise level security orchestration coordinates the safeguarding functions of safeguard software packages with respect to an installation. Multiple... |
US-1,014,8736 |
Executing parallel jobs with message passing on compute clusters A client may submit a job to a service provider that processes a large data set and that employs a message passing interface (MPI) to coordinate the collective... |
US-1,014,8732 |
Secure remote computer network A method of distributing data over multiple Internet connections is provided. The method includes the steps of: (a) providing a client computer with access to a... |
US-1,014,8697 |
Unified host based security exchange between heterogeneous end point
security agents In one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is configured to... |
US-1,014,8686 |
Telemetry analysis system for physical process anomaly detection Systems, methods, and apparatus, including computer programs encoded on computer storage media, for analyzing telemetry data from physical process sensors to... |
US-1,014,8685 |
Event correlation across heterogeneous operations Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network security threat response. A data... |
US-1,014,8679 |
Connected security system Systems, methods, and apparatus, including computer programs encoded on computer storage media, for obtaining, processing, and presenting data related to... |
US-1,014,8677 |
Model training and deployment in complex event processing of computer
network data A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security... |
US-1,014,8666 |
Unified online content manager apparatuses, methods, and systems The UNIFIED ONLINE CONTENT MANAGER APPARATUSES, METHODS, AND SYSTEMS ("Online Content Manager") transforms identification information and selection data inputs... |
US-1,014,8656 |
Securing shipment information accessed based on data encoded in
machine-readable data blocks Example embodiments provide a Shipment Preparation System ("SPS"), which facilitates the preparation of shipments, such as by producing shipping labels. In one... |
US-1,014,8648 |
Virtual smart card to perform security-critical operations A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of... |
US-1,014,8626 |
Systems and methods for facilitating mobile transactions The invention relates to a method for enabling the user of at least one mobile terminal to access one or more of a plurality of services corresponding to a... |
US-1,014,8625 |
Secure transfer and tracking of data using removable nonvolatile memory
devices A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark... |
US-1,014,8617 |
Enhanced thread handling in security handshakingdomain name system bypass
in user applications Disclosed herein are methods, systems, and software for bypassing a domain name system. In one example, a method of operating a user communication device... |
US-1,014,8504 |
Dynamic, load-based, auto-scaling network security microservices
architecture System, methods, and apparatuses used to monitor network traffic of a datacenter and report security threats are described. For example, one embodiment selects... |
US-1,014,8448 |
Control messaging in a cable network A method for providing data streams to a plurality of customer premises equipment (CPE) devices communicatively coupled to a network is provided. Downstream... |
US-1,014,8439 |
Methods and systems for controlling medical device usage Various embodiments provide systems and methods for securely transferring data from a secured site to a medical device. Some embodiments provide systems and... |
US-1,014,8431 |
Master key generation and distribution for storage area network devices Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation... |
US-1,014,8428 |
Instruction and logic to provide SIMD secure hashing round slice
functionality Instructions and logic provide SIMD secure hashing round slice functionality. Some embodiments include a processor comprising: a decode stage to decode an... |
US-1,014,8425 |
System and method for secure communications and data storage using
multidimensional encryption An encryption system and method has processors and a memory system, the memory system configured to hold at least one macroblock, an encryption key, and... |
US-1,014,8424 |
Progressive key rotation for format preserving encryption (FPE) Aspects of the disclosure provide a technological improvement to a cipher by improving data security of format-preserving encryption (FPE), by, inter alia,... |
US-1,014,8423 |
Data security system with identifiable format-preserving encryption A data security method including creating a token-including plaintext by including a predefined token into a plaintext, generating a cyphertext by encrypting... |
US-1,014,8334 |
Method and apparatus for reference signal configurations for CSI-RS port
sharing in mobile communication system... A communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system... |
US-1,014,7307 |
False alarm avoidance in security systems filtering low in network Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which... |
US-1,014,7284 |
Banking systems controlled by data bearing records Aspects of the disclosure relate to deploying, configuring, and utilizing cash handling devices to provide dynamic and adaptable operating functions. A cash... |
US-1,014,7251 |
Providing virtual and physical access to secure storage container A device may obtain a first image depicting contents included in a secure storage container at a first point in time and first user account data associated with... |
US-1,014,7249 |
Personal intermediary communication device An intermediary device may be configured to allow an authorized visitor to access a secure facility (such as a home) on behalf of an owner. The intermediary... |
US-1,014,7248 |
In vivo identity and security application implant and method An implant including a platform that performs computations and that is configured to communicate with an external system, and at least one sensor that is... |
US-1,014,7092 |
System and method for signing and authenticating secure transactions
through a communications network A system to sign and authenticate secure transactions with an institution through a communications network, comprising a terminal connected to a communications... |
US-1,014,7089 |
Data protection with translation Systems and methods are disclosed in which data associated with a transaction are protected with encryption. At an access device, a PIN associated with a... |
US-1,014,6983 |
Fingerprint decryption method and device The present disclosure is applicable to the technical field of fingerprint identification, and provides a fingerprint decryption method and device. The method... |
US-1,014,6958 |
Privacy preserving statistical analysis on distributed databases Aggregate statistics are securely determined on private data by first sampling independent first and second data at one or more clients to obtain sampled data,... |
US-1,014,6957 |
Sensitive data aliasing Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed... |
US-1,014,6954 |
System and method for data aggregation and analysis In one embodiment, a method includes managing and controlling a plurality of data-access credentials. The method further includes accessing data from a... |
US-1,014,6944 |
Recombinant threat modeling Dynamically developing and maintaining threat models, threat landscapes and threat matrices are described. Specifically described are techniques on how to... |
US-1,014,6937 |
Method for analyzing a logic circuit A method for a logic circuit including a plurality of components and channels which are each assigned functional properties in a circuit model to simulate how... |
US-1,014,6934 |
Security information sharing between applications A system and method for sharing data and a risk assessment of the data comprises receiving data in a first application and obtaining a risk level of the data,... |
US-1,014,6919 |
Multicomputer system for user data authentication and processing Aspects of the disclosure relate to multicomputer processing and authentication of user data associated with telephone calls. A call security assessment... |
US-1,014,6871 |
Method and apparatus for a digital leg history A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object... |
US-1,014,6782 |
Secure erasure of files by a filesystem In one embodiment, a method is performed by a computing device configured to manage a filesystem stored on persistent storage. The method includes (a) receiving... |
US-1,014,6760 |
Biometrically secured user input for forms Systems and methods for collecting biometrically secured financial form data from a user are described. A user input device may receive biometric data from the... |
US-1,014,6706 |
Data security system A data security system includes a first computer system including: a memory for containing data, and a processing unit connected to the memory for locking and... |
US-1,014,6701 |
Address-dependent key generation with a substitution-permutation network A method of providing security in a computer system includes producing an initial block of data from a respective address of a memory location. An updated block... |
US-1,014,6198 |
System-based control of programmable devices A requirement exists for machine-to-machine communications between the multiple Smart Devices and Networks (SDNs) a user has without in today's environment of... |
US-1,014,5790 |
Image processing apparatus, image processing method, image capturing
device and storage medium An attempt is made to suppress the processing load while securing real-time properties of the image processing to improve visual recognizability of a captured... |
US-1,014,5700 |
Vehicle firmware update using a vehicle gateway Electronic components may be integrated in objects used by the trucking industry, such as truck, tractor trailer, cargo, and loading bay. These objects may then... |
US-1,014,5617 |
Oven temperature monitoring system An oven temperature monitoring system including a box top and a box body formed out of an alkene fluorocarbon material for monitoring the temperature and... |
US-1,014,3418 |
Combination airflow, sound and pulse wave sensor pack with smartphone data
aquisition and transfer The system of the present invention is intended to provide a simple, out-of-clinic sleep disorders testing tool. It can be used for pretest screening and... |