At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Securely executing voice actions with speaker identification and
authentication input types
In some implementations, (i) audio data representing a voice command spoken by a speaker and (ii) a speaker identification result indicating that the voice...
Entry point opening sensor
A sensor package is disclosed that includes a compass and/or an accelerometer. The compass may be activated by a microcontroller in response to an indication of...
System having a mobile key unit
A system having a mobile key unit (2) for reading and writing data from at least one external device (3) of a facility (4), wherein the data at least comprise...
Inspection apparatus, inspection system, and inspection method
There are provided an inspection apparatus, an inspection system, and an inspection method capable of inspecting operation of a control device, accurately,...
Method and system for requesting a reservation for a set of contract
rights to be offered
A method and system for the determination of optimal pricing and allocation of securities in an open, competitive environment. The method and system may also be...
Method and apparatus for maintaining high data integrity and for providing
a secure audit for fraud prevention...
Any of various comparisons of computer folders from different points in time is performed. Such comparisons provide the ability to discover missing documents or...
Method for strongly encrypting .zip files
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data...
Secure rendering system that generates ray tracing samples with obfuscated
Secure rendering system that creates ray tracing samples with obfuscated positions, so that images can only be viewed by an authorized consumer able to recover...
Performing operations on intelligent storage with hardened interfaces
A storage device can include processing and cryptographic capability enabling the device to function as a hardware security module (HSM). This includes the...
Automated security vulnerability exploit tracking on social media
Embodiments automate tracking of exploit information related to initially-identified security vulnerabilities, through the data mining of social networks....
Resource usage optimized auditing of database shared memory
A system, and computer program product for security auditing of database transactions are provided in the illustrative embodiments. For a specified period, an...
Single SDIO interface with multiple SDIO units
A system and method communicates with one of two or more secure digital input output (SDIO) units that only one SDIO unit responds when it is being addressed....
Tools and methods for real-time dataflow programming language
A dataflow programming language can be used to express reactive dataflow programs that can be used in pattern-driven real-time data analysis. One or more tools...
Securely recovering stored data in a dispersed storage network
A method for execution by a dispersed storage and task (DST) execution unit that includes a processor includes receiving a slice pre-image request from a...
Split rotating keyboard system
A split rotating keyboard system for use in easing muscle strain and mitigating the effects of carpal tunnel syndrome associated with the usage of conventional...
Health monitoring apparatus with wireless capabilities for initiating a
patient treatment with the aid of a...
Individuals who suffer from certain kinds of medical conditions, particularly conditions that only sporadically exhibit measurable symptoms, can feel helpless...
System and method for secure wireless communication
A system and method for secure wireless communication for transferring or sharing data between at least two devices over a wireless network. A set of pictures...
Methods and devices for securing radio resources for an LTE-U data
A method for securing radio resources for a Long Term Evolution-unlicensed, LTE-U, data transmission is disclosed. The method includes transmitting a plurality...
Camera based safety mechanisms for users of head mounted displays
The disclosure provides methods and systems for warning a user of a head mounted display that the user approaches an edge of field of view of a camera or one or...
Camera mounting device
A web cam device includes a camera housing, a camera disposed in the camera housing, a data cable coupled to the camera that extends from the camera housing,...
Information processing system, terminal device and method of controlling
display of secure data using augmented...
An information processing system includes a server, and a terminal device communicable with the server via a network. The terminal device includes a display, an...
Policy-based secure containers for multiple enterprise applications
Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy...
Multi-factor and context sensitive biometric authentication system
This disclosure describes techniques that facilitate granting an access privilege to a client device based on selectively authenticating biometric data....
Correlation and consolidation of analytic data for holistic view of
In communication with security appliances, an electronic device for providing a holistic view of a malware attack is described. The electronic device features...
Heuristics-based identification of IoT (internet of things) attacks in
Attacks from IoT (Internet of Things) devices (or other statins) on a Wi-Fi network are identified using heuristics. Frames are detected from an IoT device (or...
Methods for establishing anomaly detection configurations and identifying
anomalous network traffic and devices...
A method, non-transitory computer readable medium, and network security apparatus that monitors received network traffic to obtain signal data for signals...
Rootkit detection system and method
A rootkit detection method includes obtaining, from a target system, first data comprising raw data stored in a data block of a storage drive, checking the...
Local area network ecosystem of verified computer security resources
A router-level computer security component validates multiple endpoint computer security components on multiple endpoint devices in a local area network, based...
Secure email verification service
Concepts and technologies are disclosed herein for providing and using a secure email verification service. A processor can receive verification data and...
Secure storage device with on-board encryption control
A communication and security device for a portable computer having an interface for connecting the security device to a host device to enable the security...
Method and device for the secure authentication and execution of programs
A device and a method for encrypting a virtual machine by on-the-fly encryption and decryption of the memory is described. The device comprises hardware and...
LPI/LPD communication systems
In a wireless communication system, a secure communication link is provided by selecting a decoy data signal vector for transmission, generating a MIMO...
Protocol based key management
A method, system, and computer usable program product for protocol based key management are provided in the illustrative embodiments. A key management protocol...
System, method and computer program product for serving an application
from a custom subdomain
In accordance with embodiments, there are provided mechanisms and methods for serving an application from a custom subdomain. These mechanisms and methods for...
Electronic document notarization
A server receives a package of data including: a document designated for notarization, identification information including a photograph, photograph of a user,...
Configuration updates for access-restricted hosts
A host machine operated for a specific purpose can have restricted access to other components in a multi-tenant environment in order to provide for the security...
Security verification apparatus using biometric information and security
A security verification apparatus using biometric information and a security verification method are described. The security verification apparatus includes a...
System and method of enforcing a computer policy
A method and system of enforcing a computer policy uses a central server to manage user profiles, policies and encryption keys. The server securely supplies the...
Method of utilizing a relay node in wireless communication system
The present invention relates to a wireless communication system and a user equipment (UE) providing wireless communication services, and more particularly, a...
Spatially enabled secure communications
Spatially Enabled Communication technologies are disclosed. A proximity boundary can be defined by a communication range of one or more SRC devices configured...
Implementing eFuse visual security of stored data using EDRAM
A method and circuit for implementing Electronic Fuse (eFuse) visual security of stored data using embedded dynamic random access memory (EDRAM), and a design...
Rapid document detection and identification
An apparatus, method, and computer program product that intentionally illuminate at least one target item with electromagnetic energy having specific...
Electronic registration for securely providing products and services
Some embodiments are directed to a method of providing a product and/or a service, at least one non-transitory computer-readable storage medium comprising...
Dynamic barcode ticketing carrying encrypted validation transactions
Systems, methods, and devices for conducting a secure ticketing transaction at a first location within a transit system. A media reader described herein may...
Systems and methods for dynamic control of a security system device based
on tag information
Systems and methods for controlling at least one security device based on the behavior of at least one tag. The methods comprise: generating sensor data...
Secure enclosure systems in a provider network
A secure containment enclosure such as an equipment rack is disclosed that includes an electronic locking system. The electronic locking system locks and, upon...
Methods and systems for encrypting data using object-based screens
A system and method is provided for encrypting data for secure storage or transport. The method includes identifying a first object comprising a string of...
System and method for automatically securing sensitive data in public
cloud using a serverless architecture
Systems and methods are provided executing jobs immediately upon receipt of a notification. The systems and methods may include receiving, at a cloud compute...
Systems and methods of providing access to secure data
The disclosed technology includes techniques for secure access to data associated with an organization and includes providing a user device access to a user...
Secure data synchronization
Techniques for secure data synchronization are described. In one or more implementations, a determination is made as to whether enterprise data is stored...