At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Light device has built-in digital data system for record image, sound
A Light device having built-in digital data means is powered by an unlimited power source for a lamp-holder, LED bulb, or light device connected to unlimited...
System and method for guaranteed high speed fax delivery
Described herein is a fax processing system that improves the speed and reliability of fax transmissions via a data communications network and provides a new...
Intelligent remediation of security-related events
An information processing system implements an intelligent remediation system for security-related events. The intelligent remediation system comprises a...
Method and system for providing security for universal plug and play
operations in a home network environment...
A method and system for providing security to Universal Plug and Play (UPnP) operations in a home network environment based on ownership rights where a request...
Method and apparatus for interworking authorization of dual stack
A method and apparatus for dynamic home address assignment by a home agent in multiple network interworking. The invention provides a method and apparatus send...
Communication system and transmission unit employed in same
Provided are a communication system that is capable of acquiring information having a relatively large data amount by a transmission unit while securing a...
Deletion of content in digital storage systems
A data processing and storage apparatus has a hardware security module and a data storage medium storing encrypted data objects and a hierarchical data...
Electronic device and load center including the same
An electronic device includes a housing defining an exterior shape of the electronic device, a processor, a power supply structured to receive line power and to...
System and method for implementing internet-based games wherein a
plurality of different games share a common...
A system and computer implemented method for conducting play of Internet-based lottery games includes providing players with a plurality of different...
Method and apparatus for secure execution using a secure memory partition
A processor includes a plurality of general purpose registers and cryptographic logic to encrypt and decrypt information. The cryptographic logic is to support...
Secure event log management
A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A...
Policy enforcement with associated data
Requests submitted to a computer system are evaluated for compliance with policy to ensure data security. Plaintext and associated data are used as inputs into...
System and method for managing collaboration in a networked secure
In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations,...
Data processing based on two-dimensional code
The present disclosure provides example methods and apparatuses of data processing based on a two-dimensional code. The two-dimensional code is generated upon...
Firmware update system for video security equipment
A firmware update system includes video security equipment and an update server. When receiving an error report from the video security equipment, the update...
Object shadowing in head worn computing
Aspects of the present disclosure relate to a secure data transfer method, including identifying a second head worn computing system ("HWC") in close proximity...
Automatic electronic communication system for tracking firearms
This invention provides a system, method and algorithm for automatic electronic communication between a firearm formed with a location tracking system and a...
Security mechanism for mobile users
A wireless communication device for use in a cellular network. The device comprises a radio interface for enabling communication between the device and a base...
System and method for authentication and key exchange for a mobile device
via spectrally confined wireless...
An architecture, system and associated method and apparatus for securely communicating authentication data to a communication device. In one embodiment, the...
Monitoring smart devices on a wireless mesh communication network
A surveillance system and method with at least one wireless input capture device ICD(s) and a corresponding digital input recorder (DIR) and/or another ICD,...
Vehicle service system optical target assembly calibration
A machine vision vehicle wheel alignment system for acquiring measurements associated with a vehicle. The system includes at least one imaging sensor having a...
Facilitating quality of service and security via functional classification
of devices in networks
Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device of...
Data analytics and security in social networks
A method for securing a social network account assigned to a member is provided. The method may include determining at least one social network account assigned...
Prioritizing security findings in a SAST tool based on historical security
A cloud-based static analysis security tool accessible by a set of application development environments is augmented to provide for anonymous knowledge sharing...
Social network security monitoring
A computer-implemented method includes security settings data associated with one or more profiles of a protected social entity on one or more social networks...
HTML security gateway
A technique allows a client computing system with a web browser to receive a web page in response to transmitting a request for content. The web page may...
Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
Compliant authentication based on dynamically-updated credentials
A system, method and a computer-readable medium for authenticating a user in a live manner in non-face-to-face transactions, including a user downloading an...
Providing a security mechanism on a mobile device
Disclosed are methods, apparatus, systems, and computer program products for providing a security mechanism on a mobile device before performing an action on a...
Auditing and permission provisioning mechanisms in a distributed secure
The embodiments described herein describe technologies for ticketing systems used in consumption and provisioning of data assets, such as a pre-computed (PCD)...
System and device for consolidating SIM, personal token, and associated
applications for selecting a...
The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification....
Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
Method for secured data processing
A method for facilitating secured data processing, the method includes generating, for each client out of at least two clients, a private key, and a public key;...
System and method for limited records access for event scheduling
The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a...
Methods and systems for increasing the security of electronic messages
A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a...
Secure data exchange technique
A technique for the secure exchange of data between multiple entities that use compatible business management systems utilizes serializable data transfer...
Dual layer transport security configuration
A system includes a first computer processor that receives a data transmission from a second computer processor. The data transmission includes a client...
Multi-level key hierarchy for securing cloud-based data sets
A hierarchy is defined that includes encryption keys associated with different first and second levels of the hierarchy, where the second level includes fewer...
Method and apparatus for authenticating access to a multi-level secure
environment of an electronic device
An electronic system utilizes a method (500) for authenticating access to a multi-level secure environment. According embodiments, the system stores (501)...
System and method for securely managing delivery and redemption of
location-based incentives and customer...
A plurality of credentials is retrieved for a user by a computing device, wherein each of the plurality of credentials is associated with a loyalty program. For...
System and method for protecting electronic money transactions
Disclosed are systems and methods for protecting electronic money transactions from fraud and malware. An exemplary method include scanning a computer to detect...
Systems, architecture of the systems, and methods for generating alert message are disclosed. A user enrolls in an alert messaging service. Information that the...
Method and system to facilitate securely processing a payment for an
A computer-implemented method, to facilitate processing a payment for an online transaction, includes, responsive to receiving secure transaction data from a...
Method of securely reading data from a transponder
The invention discloses a method of reading data (dat) from a first transponder (TAG1) into a transceiver (REA). Said (dat) are only transmitted from the first...
Instructions processors, methods, and systems to process secure hash
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
Secure factory data generation and restoration
In various embodiments, methods, devices and systems for securely generating, sealing, and restoring factory-generated calibration and provisioning data for an...
System and method for distinguishing human swipe input sequence behavior
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
Sustained data protection
Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access...
System and method for deploying a form template on multiple platforms
The present embodiments are directed to systems and methods of creating and deploying electronic forms for collecting information from a user using a browser or...