At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,948,508 |
Inherent power-over-data bus signaling for secure operating mode switching A method for changing an operating mode of a processing unit of a network node is described. The processing unit is connected to a communication and supply line... |
US-9,948,466 |
Devices, systems, and methods for authenticated intravascular device use
and reuse Devices, systems, and methods for reconditioning an intravascular device for reuse are provided. The method includes reading first security data from a memory... |
US-9,948,465 |
Digital data locker system providing enhanced security and protection for
data storage and retrieval The subject matter herein is directed to a digital data locker that acts as an intermediary between end users operating end user device and document providers.... |
US-9,948,354 |
Magnetic coupling device with reflective plate and methods for use
therewith Aspects of the subject disclosure may include, for example, a coupling device including a receiving portion that receives a radio frequency signal conveying... |
US-9,947,066 |
Method, apparatus and system for inserting watermark data An apparatus and method for a sensor network, machine-to-machine (M2M) communication, machine type communication (MTC), and Internet of things (IoT) are... |
US-9,947,009 |
Method and system for graphic and sonic encryption for securing data and
electronic devices A method of verifying a transaction between a first party and a second party using a first graphical symbol having at least a two-dimensional array of different... |
US-9,946,898 |
Security systems and methods for encoding and decoding digital content Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data... |
US-9,946,894 |
Data processing method and data processing device Provided is a data processing method in a data processing device that is connected to an external storage device and that is equipped with a storage device, the... |
US-9,946,892 |
Location based disk drive access Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a... |
US-9,946,887 |
Method and apparatus for determining privacy policy based on data and
associated values A method includes determining at least one value for at least one instance of data; determining at least one privacy policy, at least one security policy, or a... |
US-9,946,884 |
System and method for cryptographic suite management Systems and methods for cryptographic suite management are described. A system for cryptographic suite management has a cryptographic suite management unit... |
US-9,946,880 |
Software vulnerability analysis method and device The present disclosure includes: searching a code clone corresponding to a used source code from any analysis target source code; detecting a security sink and... |
US-9,946,871 |
Isolation and presentation of untrusted data Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application.... |
US-9,946,744 |
Customer vehicle data security method A database system and method for managing and storing sensitive and non-sensitive vehicle data. Received vehicle data messages are processed to separate out... |
US-9,946,662 |
Double-mix Feistel network for key generation or encryption A method of providing security in a computer system includes dividing a block of data into initial left and right halves, and calculating updated left and right... |
US-9,945,575 |
Method and apparatus for controlling temperature The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of... |
US-9,944,497 |
System and method for monitoring a transport of a passenger transportation
device or transport unit A transport-monitoring module for monitoring a transport of a transport unit of a passenger-transportation device is arranged on the transport unit. The... |
US-9,944,110 |
QR code containing machine readable DNA and nanoparticles A security code is provided having a diffractive holographic code of a quick response type, a data-matrix two-dimensional code or other bar code types, formed... |
US-9,943,227 |
Selective data transmission method and system based on central monitoring
system The present invention provides a selective data transmission method and a system based on a central monitoring system. The selective data transmission method... |
US-9,942,751 |
Audio proximity-based mobile device data sharing At least two mobile devices introduce one another and select data for transfer to and receipt by at least one receiving mobile device using audio... |
US-9,942,747 |
Dynamic utilization of services by a temporary device A system for dynamically providing or utilizing services and applications on a temporary or new device is provided. A user can send a message with a secure code... |
US-9,942,626 |
Low power wireless RF communication platform and ad-hoc security network
utilizing same Wireless radio frequency communications platform may include a plurality of sensor units communicatively coupled over a wireless radio frequency communication... |
US-9,942,586 |
Method and apparatus for hardware-enforced, always-on insertion of a
watermark in a video processing path A method, apparatus, article of manufacture, and a memory structure for inserting a watermark in a media program is described. In an exemplary embodiment, the... |
US-9,942,443 |
Information processing apparatus, information processing method, and
non-transitory computer readable medium An information processing apparatus includes plural communication interfaces, a specifying unit, a network determining unit, and a transmission controller. The... |
US-9,942,441 |
Information processing apparatus configured to predict a size of a
storage-use region , method, image... An information processing apparatus includes a memory, and circuitry. The circuitry acquires a plurality of images divided from original image data, the... |
US-9,942,275 |
Method and system for automatically managing secure communications and
distribution of secrets in multiple... Communications and security policy data for two or more zones is obtained that includes data indicating allowed protocols for the respective communications... |
US-9,942,261 |
Dynamic optimizing scanner for identity and access management (IAM)
compliance verification An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM... |
US-9,942,231 |
System, method, and program product for processing secure transactions
within a cloud computing system Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment... |
US-9,942,227 |
Apparatus and method for secure over the air programming of a
communication device A system that incorporates the subject disclosure may perform, for example, receiving an over-the-air programming message that is utilizing a hypertext transfer... |
US-9,942,226 |
NFC package for storing biometric information and electronic device An electronic device includes a biometric sensor configured to generate biometric data by sensing a biometric characteristic and to encrypt the biometric a near... |
US-9,942,219 |
Data security In one embodiment, a method is provided that may include one or more operations. One of these operations may include, in response, at least in part, to a... |
US-9,942,212 |
Communication device and system, data processing method and method for
secure data exchange The present invention relates to a method for processing data in a communication device comprising a host and a security module associated with this host. This... |
US-9,942,209 |
Technologies for secure extensible inter-device I/O redirection across a
network Technologies for secure I/O redirection include a provider device, a consumer device, an authentication server, and a messaging server. The provider device and... |
US-9,942,208 |
Updating stored encrypted data with enhanced security Technologies described herein provide enhanced security for storing and updating secret data, such as a password. Based on one or more conditions, an existing... |
US-9,942,207 |
Security network controller Described herein is a security network controller having a main bus to which is coupled a central processing unit, a cryptographic processing circuit, a... |
US-9,942,198 |
Internet isolation for avoiding internet security threats A host computer supports a virtual guest system running thereon. The host system has a firewall that prevents it from communicating directly with the Internet,... |
US-9,942,043 |
Token security on a communication device Techniques for enhancing the security of storing sensitive information or a token on a communication device may include sending a request for the sensitive... |
US-9,942,035 |
Platform migration of secure enclaves A processor to support platform migration of secure enclaves is disclosed. In one embodiment, the processor includes a memory controller unit to access secure... |
US-9,942,032 |
Systems and methods for securely detecting data similarities A computer-implemented method for securely detecting data similarities may include (1) identifying a private data object subject to comparison to determine a... |
US-9,941,962 |
Free space optical data transmission for secure computing An apparatus and method for computer network security based on Free-Space Optical Interconnections (FSOI) for board-to-board information transmission. The... |
US-9,940,930 |
Securing audio data Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for securing audio data. In one aspect, a method includes... |
US-9,940,765 |
Location based secure data device In providing secure data access, a secure data device receives a data access request to access secured data stored in a storage of the secure data device. A... |
US-9,940,611 |
Secure wireless network-based activation for table-side information and
point-of-sale devices A new terminal is seamlessly and securely integrated to an existing (primary) Wi-Fi network within an operating environment at a restaurant location. The... |
US-9,940,487 |
USB security device, apparatus, method and system A self-locking USB filter device is disclosed that comprises at least one permanently attachable self-locking USB plug having at least one locking tooth to... |
US-9,940,480 |
Securing delegated remote management with digital signature A system and method of executing a script includes receiving, by a service user account module, a user script from a first user account. The method includes... |
US-9,940,477 |
Geolocation-based encryption method and system A geolocation-based encryption method and system. The geolocation-based encryption method and system may comprise the steps of: providing an encryption... |
US-9,940,470 |
Techniques for generating a virtual private container Techniques for generating a virtual private container (VPC) are disclosed. In one embodiment, the techniques may be realized as a virtual container defining a... |
US-9,940,462 |
Code validation Methods and apparatus for validating a system include reading protected record data for a section of the system from a secure storage element, and verifying... |
US-9,940,456 |
Using trusted execution environments for security of code and data An embodiment includes a processor coupled to memory to perform operations comprising: creating a first trusted execution environment (TXE), in protected... |
US-9,940,453 |
Method and system for securing user access, data at rest and sensitive
transactions using biometrics for mobile... Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The... |