At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-1,015,7284 |
Multi-party encryption cube processing apparatuses, methods and systems Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an... |
US-1,015,7269 |
Verification system for secure transmission in a distributed processing
network A verification system, includes: an arithmetic/logic unit ("ALU") to perform one or more mathematical operations and compare selected variables; a register to... |
US-1,015,6917 |
Input apparatus and controlling method thereof An input apparatus capable of receiving an input is provided. The input apparatus includes a communicator configured to communicate with a first user terminal... |
US-1,015,6900 |
Systems and methods for discerning eye signals and continuous biometric
identification Apparatus, systems, and methods are provided for substantially continuous biometric identification (CBID) of an individual using eye signals in real time. The... |
US-1,015,6604 |
Semiconductor apparatus and method of operating the same A semiconductor apparatus includes a debugging processor that performs a debugging operation related to at least one selected intellectual property (IP) block... |
US-1,015,6582 |
Bicycle pedaling frequency sensor The present disclosure is for a bicycle pedaling frequency sensor comprising a signal acquisition unit, a data transmission unit, and/or a data conversion unit.... |
US-1,015,4814 |
Wearable personal information system A personal information system is provided. The system may include a portable information device having a housing including a top surface defined at least... |
US-1,015,4444 |
Method and apparatus for improving handover success rate The present disclosure relates to a communication technique for combining a 5G communication system for supporting a higher data transmission rate after a 4G... |
US-1,015,4408 |
System and method for providing a public number-private number telephony
system This invention shows a method for operating a voice communications network that comprises dynamically associating a private number with at least one public... |
US-1,015,4398 |
Methods and systems for node selection in multihop wireless sensor
networks A method and system for node selection in a multihop wireless sensor network is disclosed. The method includes: determining, at a source node, a leftover energy... |
US-1,015,4084 |
Hybrid applications utilizing distributed models and views apparatuses,
methods and systems The HYBRID APPLICATIONS UTILIZING DISTRIBUTED MODELS AND VIEWS APPARATUSES, METHODS AND SYSTEMS ("HAP") transform hybrid application user inputs using HAP... |
US-1,015,4066 |
Context-aware compromise assessment Assessing compromises of data security is achieved by establishing access control policies for data files in storage devices across an enterprise. A list is... |
US-1,015,4062 |
Rule lookup using predictive tuples based rule lookup cache in the data
plane This disclosure describes an approach to handle packets that arrive at a network security device, such as a router. At a data plane of the security device,... |
US-1,015,4047 |
Method and system for generating a kill chain for monitoring computer
network security A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security... |
US-1,015,4044 |
Method, system, and computer program product for providing security and
responsiveness in cloud based data... A storage controller that is coupled to a plurality of storage clouds is maintained. The storage controller determines security requirements for performing a... |
US-1,015,4037 |
Techniques for implementing a data storage device as a security device for
managing access to resources Techniques are disclosed for implementation of a data storage device as a security device for managing access to resources. These techniques can be implemented... |
US-1,015,4031 |
User-wearable secured devices provided assuring authentication and
validation of data storage and transmission Described are user-wearable devices utilizing encryption authentication techniques to ensure security of any data transmission to and from these devices. In... |
US-1,015,4028 |
Systems and methods for authenticating users accessing a secure network Systems and methods are disclosed for providing an unregistered user with access to a network in a secure and efficient manner. A random, on-demand password is... |
US-1,015,4021 |
Securitization of temporal digital communications with authentication and
validation of user and access devices One more devices and/or access control systems are described that securitize data and data transmissions using three sets of computing operations including... |
US-1,015,4016 |
Devices for transmitting and communicating randomized data utilizing
sub-channels The disclosure provides for two or more transceiver devices and a system that utilizes one or more encrypters and one or more decrypters comprising one or more... |
US-1,015,4014 |
Method and system for efficient encryption, transmission, and decryption
of video data One embodiment provides a system for efficiently and securely encrypting, transmitting, and decrypting video data, including selective encryption of image... |
US-1,015,4011 |
Secure data sharing with publicly accessible computing nodes An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the... |
US-1,015,3983 |
Optimum resource routing using contextual data analysis Systems, apparatus are defined that provide for determining optimal resource channels for delivering resources using contextual and prior usage data analysis.... |
US-1,015,3906 |
Systems and methods for implementing computer security A security server transmits a specification of a first set of files and directories to a computing device for monitoring according to a security policy. Each of... |
US-1,015,3902 |
Secure data transmission using natural language Methods, systems, and apparatus, including computer programs encoded on computer storage media, for secure data transmission using natural language. One of the... |
US-1,015,3898 |
Wireless mesh network with secure automatic key loads to wireless devices A wireless mesh network provides secure communication by encrypting data using one or more encryption keys. A configuration device in communication with a... |
US-1,015,3895 |
Homomorphic database operations apparatuses, methods and systems The HOMOMORPHIC DATABASE OPERATIONS APPARATUSES, METHODS AND SYSTEMS ("HEDO") transform transaction storage requests and homomorphic model queries using HEDO... |
US-1,015,2868 |
Smart bedtime A method for security and/or automation systems is described. In one embodiment, the method may include receiving occupancy data, identifying characteristics of... |
US-1,015,2861 |
Wireless security camera system A security camera system, comprising wireless communication components for communicating over first and second wireless communications, and a digital camera... |
US-1,015,2860 |
Monitoring smart devices on a wireless mesh communication network A surveillance system and method with at least one wireless input capture device ICD(s) and a corresponding digital input recorder (DIR) and/or another ICD,... |
US-1,015,2749 |
Systems and methods for trading a trade list in financial markets Systems and methods are provided for maintaining neutrality while trading a list of securities using an algorithmic trading facility coupled with at least one... |
US-1,015,2746 |
Flexible security system for cash-in-transit There is provided an adaptive access-control and monitor system that comprises at least one portable communication device, further comprising, a transceiver... |
US-1,015,2706 |
Secure NFC data authentication A mobile device includes a wireless transceiver, a host processor, a secure element (SE), and a near field communication (NFC) system having an NFC transceiver... |
US-1,015,2618 |
Reader, writer and method for programmable tags A tag writer, reader and method are disclosed. The tag writer is operable to generate a security identifier during writing of data to the tag, the security... |
US-1,015,2607 |
Secure access to hierarchical documents in a sorted, distributed key/value
data store Policy-based, cell-level access control is provided in association with a sorted, distributed key-value data store. As data representing a hierarchical document... |
US-1,015,2605 |
Systems and methods for front-end and back-end data security protocols A security framework and methodology is provided which provides front-end security through authentication and authorization, and back-end security through a... |
US-1,015,2581 |
Methods and systems for data entry User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple... |
US-1,015,2524 |
Wavefront muxing and demuxing for cloud data storage and transport Security on data storage and transport are important concerns on cloud computing. Wavefront multiplexing/demultiplexing process (WF muxing/demuxing) embodying... |
US-1,015,2465 |
Security-focused web application crawling Various embodiment methods for performing security-focused web crawling by a server may include identifying sensitive data on a first web page, and generating a... |
US-1,015,2268 |
System and methods for replication resource management in asymmetric
secure multi-tenancy deployments in... A method for replicating data from a plurality of storage systems to a target storage system. The method implemented at the target storage system receives a... |
US-1,015,2257 |
Random number generation in ferroelectric random access memory (FRAM) Disclosed embodiments relate to generating random numbers using two transistor, two capacitor (2T-2C) ferroelectric memory cells. In accordance with one... |
US-1,014,9653 |
Secure patient data recorder for recording monitored vital sign data A monitor and recorder system having a monitor unit for gathering vital sign data from a patient and a memory module for automatically recording the data. Means... |
US-1,014,9398 |
Method for improving fire prevention performance of vehicle-carried data
recording device and protection device... A method for improving fire prevention performance of a vehicle-carried data recording device and a protection device thereof are provided, where the method... |
US-1,014,9344 |
Device and method of handling a radio resource control state change A communication device for handling a radio resource control (RRC) state change comprises a storage unit for storing instructions and a processing circuit,... |
US-1,014,9333 |
Communication data processing method, apparatus, and system Embodiments of the present invention provide a communication data processing method, an apparatus, and a system. A communication data processing method... |
US-1,014,9197 |
Methods and apparatus for secure connectionless uplink small data
transmission Certain aspects of the present disclosure generally relate to techniques for secure connectionless uplink transmissions by a wireless device. Such techniques... |
US-1,014,9154 |
Apparatus and method for sharing WiFi security data in an internet of
things (IoT) system An apparatus for connecting an Internet of Things (IoT) hub to a wireless network, the apparatus including: 1) a security module to generate a first secret and... |
US-1,014,9153 |
Wireless communication system A wireless communication system comprises two communication units (101, 03) which exchange public key identification data using both Near Field Communication... |
US-1,014,9150 |
Updating profiles for secondary wireless devices Techniques to manage updates for eSIMs of a secondary wireless device are disclosed. Responsive to a user input, expiration of a timer, receipt of a message... |
US-1,014,9144 |
Simulacrum of physical security device and methods Described herein is a simulacrum security device and methods. In one embodiment, a simulacrum or likeness of a physical security device is provided for use in... |