At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,641,894 |
Making HDR viewing a content owner agreed process To allowed for increased security for selling HDR movies (or at least HDR experiences) even when some of the movie data gets pirated, an image transformation... |
US-9,641,517 |
System and method for secure communications A system and method provides security features for inter-computer communications. After a user has proved an association with one of several firms, a user... |
US-9,641,493 |
Protecting data owned by an operating system in a multi-operating system
mobile environment An approach is provided for protecting data owned by an operating system on a mobile computing device having multiple operating systems. A map specifying... |
US-9,641,240 |
Transferring data over bluetooth using intermediary bridge In one or more embodiments, a first device such as a mobile phone can establish a wireless connection with second device, and the second device can act as a... |
US-9,639,794 |
Secure upgrade supplies and methods Example secure upgrade supplies and methods are disclosed. A disclosed example upgrade supply cartridge structured includes a chamber to store a material... |
US-9,635,487 |
Apparatus and methods for provisioning subscriber identity data in a
wireless network Apparatus and methods for provisioning wireless devices for operation in one or more networks. In one embodiment, a provisioning service may provide access... |
US-9,635,034 |
System for authorizing electronic communication of confidential or
proprietary data to external entities A platform for providing authorization of electronic communication of secure data to external entities, e.g., vendors, third parties or the like based on an... |
US-9,633,494 |
Secure destruction of storage devices Techniques are provided for securely destroying storage devices stored in a data storage center. A server room may be situated in the data storage center that... |
US-9,633,254 |
Intelligent motion capture element Intelligent motion capture element that includes sensor personalities that optimize the sensor for specific movements and/or pieces of equipment and/or clothing... |
US-9,633,234 |
System and method for a secure display module A system for a secure display module includes a display element array, a driver controller, a communication interface, a host controller and a cryptographic... |
US-9,631,899 |
Ballistic and impact protective military helmet assembly A helmet assembly is provided including a front mount configured to attach to the front of the helmet above a brim of the helmet, a mandible for protecting a... |
US-9,630,715 |
Interaction during delivery from aerial vehicle An unmanned aerial vehicle (UAV) is disclosed that includes a retractable payload delivery system. The payload delivery system can lower a payload to the ground... |
US-9,628,274 |
Hardening tokenization security and key rotation A method of using a hardware security module and an adjunct application programming interface to harden tokenization security and encryption key rotation is... |
US-9,626,829 |
Data processing device and method for interaction detection The current invention discloses devices and methods that may be used for detection and verification of interactions, such as collisions, between objects in... |
US-9,626,205 |
Hypervisor driven embedded endpoint security monitoring Aspects of the present disclosure are directed to methods and systems of hypervisor driven embedded endpoint security monitoring. A computer implemented method... |
US-9,621,521 |
Rapid data encryption and decryption for secure communication over open
channels with plausible deniability Technologies are generally described for providing rapid data encryption and decryption for secure communication over an open channel with plausible... |
US-9,619,985 |
Home automation communication system A method for security and/or automation systems is described. In one embodiment, the method may include receiving occupancy data associated with a home. The... |
US-9,619,984 |
Systems and methods for correlating data from IP sensor networks for
security, safety, and business... Monitoring systems and methods for use in security, safety, and business process applications utilizing a correlation engine are disclosed. Sensory data from... |
US-9,618,287 |
Secure smartphone-operated locking device A gun trigger-locking device which is configured to be manually installed on a gun with a trigger-blocking member disposed behind the trigger to prevent the gun... |
US-9,616,828 |
Global automotive safety system A system for providing security to an in-vehicle communication network, the system comprising: a data monitoring and processing hub; and at least one module... |
US-9,616,814 |
Vehicle security alarming system determining relative velocity between a
front car and a rear car by sounds... A vehicle security alarming device determining a relative velocity between a front car and a rear car by sounds retrieved therefrom, comprising a vehicle noise... |
US-9,615,196 |
NFC device configuration after device power up A NFC tag includes an NFC controller, with a secure element coupled to the NFC controller. The secure element is to send first configuration data to the NFC... |
US-9,615,063 |
Method and apparatus for visual monitoring A device for visual monitoring comprises a mobile chipset disposed in a housing, at least one eyestalk attached to the housing and communicatively coupled to... |
US-9,615,060 |
Secure nonscheduled video visitation system Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated... |
US-9,615,036 |
Single element radiometric lens The disclosure describes systems and apparatuses that include a focusable lens, as well as methods for focusing the optical lens. The focusable lens system... |
US-9,614,917 |
System and method of providing secure data transfer A system and method is provided for providing secure accelerated data transfer. The system may transparently provide accelerated data transfer between a client... |
US-9,614,871 |
Cloud-based surveillance with intelligent tamper protection In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively... |
US-9,614,870 |
Method of DDoS and hacking protection for internet-based servers using a
private network of internet servers by... A method of DDoS and hacking protection for internet-based servers using a private network of internet servers utilizes multiple data streams sent over a... |
US-9,614,858 |
Method and system for remote data access using a mobile device A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and... |
US-9,614,813 |
Methods and systems to implement fingerprint lookups across remote agents The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect... |
US-9,614,774 |
Method for providing a QoS prioritized data traffic A method for transmitting data packets of a data traffic between a sending device (10, 80) and a receiving device (80, 10) via a VPN client (200) and a VPN... |
US-9,614,681 |
Private electronic signature service for electronic documents Techniques are disclosed for providing an electronic signature service where the content of an electronic document to be signed remains unknown to the service.... |
US-9,614,676 |
Cryptographically-secure packed proactive secret sharing (PPSS) protocol Described is a system for implementing proactive secret sharing. The system uses a Secret-Share protocol to distribute, by a computing device, a block of secret... |
US-9,614,671 |
User access control based on a graphical signature A user inputs a pattern consisting of a plurality of lines. The lines are classified by relative length, overall direction and degree of curvature. Where a line... |
US-9,614,670 |
Systems and methods for encryption and provision of information security
using platform services Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in... |
US-9,614,669 |
Secure network communications using hardware security barriers One embodiment includes hardware-based cybersecurity devices that create a physical barrier ("hardware security barrier") between a computer's (or other... |
US-9,613,355 |
Multi-layer transaction tracking and encryption Embodiments for tracking multi-layer secured transactions include systems for providing a dedicated secure transaction channel to a user and sending... |
US-9,613,352 |
Card-less payments and financial transactions Payments and financial transactions are made without a physical card (and without a password). Payment information of a payer is functionally handicapped while... |
US-9,613,304 |
Smartcard connector A smartcard connector for connecting a smartcard within a card holder to an electronic device. The smartcard connector includes a card holder having a card... |
US-9,613,228 |
Isolation and presentation of untrusted data Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application.... |
US-9,613,225 |
Electronic device, system and method for securing data An electronic device capable of securing data is provided. The electronic device includes a storage device for storing data and a number of securing strategies.... |
US-9,613,220 |
Secure data parser method and system The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention... |
US-9,613,213 |
Using telemetry to reduce malware definition package size Clients send telemetry data to a cloud server, where the telemetry data includes security-related information such as file creations, timestamps and malware... |
US-9,613,190 |
Systems and methods of secure data exchange An example method for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment... |
US-9,613,163 |
Efficient packet forwarding using cyber-security aware policies For balancing load, a forwarder can selectively direct data from the forwarder to a processor according to a loading parameter. The selective direction includes... |
US-9,612,904 |
Memory system and method for securing volatile memory during sleep mode
using the same ECC module used to... In one embodiment, a memory system is provided comprising a volatile memory, a non-volatile memory, and an error correction code (ECC) module. The ECC module is... |
US-9,612,782 |
Scheduled and secured cloud print services Techniques are provided for processing scheduled and secured print requests. In one embodiment, a printing device receives a notification form a network service... |
US-9,612,617 |
Wearable computing device for managing and storing data The disclosed embodiments present a wearable computing device for storing and managing data. The wearable computing device includes a wristband including a... |
US-9,611,403 |
Fluorescent security enabled ink for digital offset printing applications An ink composition useful for digital offset printing applications comprises a fluorescent colorant and a plurality of curable compounds. The compounds have... |
US-9,610,619 |
Supercritical fluid cleaning of banknotes and secure documents A method and system for cleaning a secure instrument, such as a banknote, including a substrate, visual data and a security feature, including exposing the... |