At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,975,327 |
System and method for adjusting printhead operations in a direct-to-object
printer having a fixed printhead array A direct-to-object printer includes a plurality of imaging devices that generates image data of an object secured in a holder before the holder and the object... |
US-9,974,283 |
Collar mounted intruder detection security system A security system configured to be attached about the neck of a dog, includes a collar having opposed ends, each end having a fastener such that the belt is... |
US-9,974,002 |
Grouping of user terminal cell access information in a system information
block Disclosed is a method for generating and transmitting system information in a mobile radio cell. In said method, system information is grouped into several... |
US-9,973,927 |
Enabling a software application to be executed on a mobile station The invention enables a software application to be executed on a mobile station in dependence of a SIM. Challenge data originating from the software application... |
US-9,973,926 |
Secure multi-channel communication system and method One embodiment of the invention is directed to a method comprising receiving a plurality of data packets including encoded data. The method further comprises... |
US-9,973,924 |
Method and system to enable secure communication for inter-eNB
transmission The embodiments herein provide a method and system for creating a secure connection for a User Equipment (UE) in a wireless network including a UE, carrier... |
US-9,973,625 |
System to share and present temporary contact information A system for sharing and presenting temporary contact information associated with a service personnel. When a user generates an order request, the system... |
US-9,973,547 |
Method and systems for adaptively managing hypertext transfer protocol
sessions in a content delivery network A system (100) includes an interface portal (116) to receive (401), at a resource locator (402) pointing to media content (101), a request (117) for the media... |
US-9,973,540 |
System and method for building intelligent and distributed L2-L7 unified
threat management infrastructure for... A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically... |
US-9,973,538 |
Architecture of transparent network security for application containers A system comprises one or more application containers, each application container including computer-readable instructions and initiated via a container service... |
US-9,973,536 |
Directing audited data traffic to specific repositories Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules. A... |
US-9,973,527 |
Context-aware proactive threat management system This disclosure is directed to a context-aware proactive threat management system. In general, a device may use internal activity data along with data about... |
US-9,973,524 |
Information technology security assessment system A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization... |
US-9,973,523 |
Cognitive information security using a behavioral recognition system Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the... |
US-9,973,522 |
Identifying network security risks Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying network security risks. One of the methods... |
US-9,973,521 |
System and method for field extraction of data contained within a log
stream Embodiments of the present invention disclose populating a database by conducting a training phase to analyze training security log streams. A server extracts... |
US-9,973,515 |
Network security for avionics with ethernet connections system and related
method A system and method is disclosed for identification and response to an unauthorized transmission to a networked critical system. The invention employs a... |
US-9,973,508 |
Dynamic record identification and analysis computer system with event
monitoring components Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. In... |
US-9,973,500 |
Security architecture for authentication and audit A mechanism for consolidating communications between a computer tenant and a web services layer is provided. The mechanism may include a web services layer. The... |
US-9,973,492 |
Unified mobile security system and method of operation A mobile secure agent on a wireless device executes one or more authenticated data collection profiles provisioned by a private profile producer. Each data... |
US-9,973,484 |
System and method for securely storing and sharing information The present application generally relates to systems, devices, and methods to conduct the secure exchange of encrypted data using a three-element-core mechanism... |
US-9,973,481 |
Envelope-based encryption method The present document describes systems and methods that, in some situations, improve data security. In one embodiment, communications between a client and a... |
US-9,973,480 |
Multi-level security enforcement utilizing data typing A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted... |
US-9,973,479 |
Communication system and communication method for communication based on
encryption capabilities of device The present embodiments relate to a communication system, communication method, information processor, method, device, program, and recording medium which... |
US-9,973,477 |
Method and system for secure requesting of an object via a communications
network A method for requesting an object by means of a client system, which is coupled to a server system operatively via a communications network is provided, wherein... |
US-9,973,475 |
Data computation in a multi-domain cloud environment A gateway device for implementing data security is described herein. The gateway device is coupled between a client device and a server device, and is... |
US-9,973,472 |
Methods and systems for orchestrating physical and virtual switches to
enforce security boundaries Some embodiments include methods comprising: writing entries in a forwarding table of a switch through an application programming interface (API) of the switch,... |
US-9,973,334 |
Homomorphically-created symmetric key One embodiment of the invention includes a method, including performing, a symmetric homomorphic encryption of a secret S.sub.A with a cryptographic key H as... |
US-9,973,002 |
Dynamic demand response in a renewable energy-based electricity grid
infrastructure In a renewable energy-based electricity grid infrastructure, distributed data analytics enable modeling and delivery of an appropriate, time-sensitive, dynamic... |
US-9,972,180 |
Autonomous area monitoring device using a multi-area passive infrared
sensor A multi-area passive infrared sensor (PIF) produces a two-dimensional image formed of a grid of squares corresponding to adjacent elementary areas of an area to... |
US-9,972,006 |
Method for secure execution of entrusted management command A method for secure execution of an entrusted management command. The method includes: when an entrusted management command is received by a slave security... |
US-9,971,910 |
Multi-level security domain separation using soft-core processor embedded
in an FPGA A system and method for operating multiple security domains on one circuit card assembly, using a field-programmable gate array (FPGA) with an embedded security... |
US-9,971,909 |
Method and apparatus for secure execution using a secure memory partition A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor... |
US-9,971,906 |
Apparatus and method for continuous data protection in a distributed
computing network A system for secure data storage and transmission is provided. The system comprises a first security module for protecting data in a first data at rest system... |
US-9,971,899 |
Secure, targeted, customizable data removal A method for securely removing data from a storage system is disclosed. In one embodiment, such a method includes receiving, by a storage system, instructions... |
US-9,971,888 |
OS security filter A system and method for protecting against the unauthorized use of operating system level commands is disclosed. The system includes a computer module... |
US-9,971,825 |
System and method for dynamic and secure communication and synchronization
of personal data records A system and method for dynamic and secure communication and synchronization of personal data records through a distributed network. More specifically, a system... |
US-9,971,809 |
Systems and methods for searching unstructured documents for structured
data The disclosed computer-implemented method for searching unstructured documents for structured data may include (1) receiving a request to search unstructured... |
US-9,971,656 |
Instant data restoration An exposed Internet Small Computer System Interface (iSCSI) target of a backup repository is defined as a source of, and a storage volume to be recovered as a... |
US-9,971,138 |
Modular microscope construction A system, apparatus and method for using modular microscopes is disclosed. Connecting the housings of the individual microscope modules provide the structural... |
US-9,970,773 |
Navigation system for accessing navigation data stored in an
access-protected manner A navigation system stores navigation data in an access-protected manner. The navigation system includes navigation units that utilize the navigation data... |
US-9,969,410 |
Railway safety critical systems with task redundancy and asymmetric
communications capability A railway safety critical application system substitutes commercial off-the-shelf (COTS) hardware and/or software for railway-domain specific product... |
US-9,969,179 |
Assemblies, systems, and methods for franking one or more sequential
mailpiece on a high speed mail sorter Assemblies, systems, and methods for applying postage indicia to one or more sequential mailpiece on a high speed mail sorter are disclosed. In some aspects, a... |
US-9,968,852 |
Secure data encoding for low-resource remote systems A method includes receiving an input artefact and a set of shared parameters comprising a coding frame, one or more positioned elements, a travel path, and an... |
US-9,968,851 |
Secure data encoding for low-resource remote systems A method includes identifying a string and parameters. The parameters include a coding frame, elements, and a travel path. The method includes traversing the... |
US-9,968,262 |
Optical speculum A system for direct imaging and diagnosing of abnormal cells in a target tissue includes a disposable optical speculum and an image acquisition system having... |
US-9,967,750 |
Location verification based on environmental sensor data Techniques are described for determining and/or verifying the location of a device based on environmental data. A device may provide location information... |
US-9,967,748 |
Network access via telephony services A method includes receiving a token at a first device via a second device. The token is received by the second device from a computing system responsive to a... |
US-9,967,740 |
Method and system to enable secure communication for inter-eNB
transmission The embodiments herein provide a method and system for creating a secure connection for a User Equipment (UE) in a wireless network including a UE, carrier... |
US-9,967,739 |
Mobile virtualization platform for the remote control of a medical device The invention concerns a medical assembly which insures a secured communication between a medical device (like a insulin pump) and its remote control which... |