At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
DATA PROCESSING METHOD AND SYSTEM
A data processing method and system are disclosed for processing hyperspectral image data of a scene for locating targets within the scene. The method...
METHODS AND SYSTEMS FOR CAPTURING BIOMETRIC DATA
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
FINGER PRINT SENSOR AND MANUFACTURING METHOD THEREOF
A fingerprint sensor device and a method of making a fingerprint sensor device. As non-limiting examples, various aspects of this disclosure provide various...
ELECTRONIC DEVICE COMPRISING FINGERPRINT SENSOR
The present invention relates to an electronic device comprising a capacitive fingerprint sensor having a fingerprint sensing surface forming part of an...
SKIN TEXTURE COLLECTION AND IDENTITY RECOGNITION METHOD AND SYSTEM
This application discloses a skin texture collection and identity recognition method. The method includes: collecting a skin texture image of a user;...
SYSTEM FOR CAPTURING A CODED IMAGE
An aimer module for a mobile device and method of use is provided. The aimer module advantageously collimates diffuse light from a lamp on a mobile device for...
OPTICAL ACCESSORY FOR ATTACHMENT TO MOBILE DEVICE
An attachment assembly for use with a mobile device with a camera or a case for the mobile device can include one or more of an attachment base and an...
OPTICAL CODE READING SYSTEM WITH DYNAMIC IMAGE REGIONALIZATION
In a method and system for acquiring image data for detection of optical codes located on objects carried by a conveyor system, a conveyor system has an imager...
AIMER ACCESSORY FOR CAPTURING A CODED IMAGE
An aimer accessory for a mobile device and method of use is provided. The accessory includes a body configured for being affixed to the mobile device. The body...
SYSTEM AND METHOD FOR IDENTIFYING LOCATIONS OF MOBILE ELEMENTS IN A
FACILITY WITH A NUMBER OF REGIONS
A system for identifying respective locations of mobile elements in a number of regions. The system includes a number of board RFID tags, each of which is...
COMMUNICATION DEVICE AND SYSTEM
The present invention relates to a communication method, device, and system. The communication method include using low-frequency alternating magnetic field...
COMMUNICATIONS SYSTEM FOR AIRCRAFT
Methods for communicating between a near field device and a near field reader, near field readers, and systems for near field device reading on an airplane are...
RECEIVER UNIT FOR AN RF TAG
The present invention concerns a receiver unit comprising a first and a second input terminal to which are connected an antenna, a communication stage adapted...
Methods and systems of processing transponder signals received from transponders to identify the transponders are provided. A first signal including a first...
A card reader may include a plurality of IC contact points to communicate data with a card; an IC contact block holding the plurality of the IC contact points;...
INTEGRATED CIRCUIT, DIAGNOSTIC SYSTEM AND DIAGNOSTIC METHOD
An integrated circuit is one that performs radio communication with an external apparatus and includes a processing circuit, a diagnostic circuit configured to...
ACCESSORY, ELECTRONIC APPARATUS AND SYSTEM FOR ACCESSORY CERTIFICATION
An accessory, an electronic apparatus and a system for accessory certification is disclosed. The accessory comprises an encryption chip, with the encryption...
ACTIVATING AN ELECTRONIC PRIVACY SCREEN DURING DISPLAY OF SENSITVE
One embodiment provides a method including: receiving, on a display device, a request to display data; detecting, using a processor, a factor indicating a need...
METHODS AND SYSTEMS FOR SECURING STORED INFORMATION
Methods and systems for securing information are provided. The method includes generating a hash key by an input/output (I/O) processing module interfacing...
Method and Device for Processing Hidden File Folder, and Terminal
Provided are a method, device for processing a hidden file folder, and a terminal. The method comprises that: an application icon to which the hidden file...
ELECTRONIC PREEMPTIVE EVIDENTIARY ESCROW PLATFORM
The system and method described herein provide mechanisms by which connected devices and/or internal subsets of devices can be used to implement an electronic...
PERSONAL IDENTIFICATION NUMBER DISTRIBUTION DEVICE AND METHOD
The method of distributing a personal identification number to a user of a financial instrument associated with the personal code includes: a step of sending...
PRIVACY AUTHORITY MANAGEMENT METHOD AND DEVICE
Disclosed is a privacy authority management method, including: when a service that needs to use a privacy authority in an operating system is triggered,...
SYSTEMS AND METHOD FOR OBFUSCATING DATA USING DICTIONARY
At least some aspects of the present disclosure feature systems and methods for obfuscating data. The method includes the steps of: receiving an input data...
DATA PROTECTION BASED ON USER INPUT DURING DEVICE BOOT-UP, USER LOGIN, AND
DEVICE SHUT-DOWN STATES
A computing device is described herein that automatically enters a data protection mode in response to the detected presence or absence of certain user input...
SYSTEM AND METHOD FOR ONLINE KEY ROTATION
The system may comprise receiving a data element, and receiving an encryption key and an associated encryption key identifier from an encryption keystore...
DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR ACCESSING AN APPLICATION
IN A LOCKED DEVICE
A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected...
METHOD FOR PROTECTING CLOUD STORAGE VIDEO DATA AND SYSTEM THEREOF
A method for protecting video data stored in a cloud and a system thereof. The method comprises the following steps: when video data needs to be protected,...
SECURE CONTENT SHARING
Technologies for sharing secure content include a source computing device to determine a content use policy for content of the source computing device. The...
Data sanitization comprises tracking at least one block being freed from a file when an action is performed on the file to remove data. Further, it is...
System and Method to View Encrypted Information on a Security Enabled
A secure display device includes a display and a decoder. The secure display device receives encoded content that includes information that encodes a secure...
Protecting Personal Data
Personal information related to calls is protected from disclosure. Mobile location data may be useful for profiling users of mobile devices. However,...
DIRECTED EXECUTION OF DYNAMIC PROGRAMS IN ISOLATED ENVIRONMENTS
A test object that includes at least one computer program that includes dynamic executable code is obtained. The at least one computer program is transformed...
Program Vulnerability Identification
In one embodiment, a system for identifying and tracking application vulnerabilities includes an interface, a processor, and a memory. The interface is...
SECURE PROCESSOR FOR SOC INITIALIZATION
An embedded system includes an interface to an external peripheral device storing secure boot code and a secure boot controller. The secure boot controller...
SOFTWARE VULNERABILITIES DETECTION SYSTEM AND METHODS
This invention teaches a system and methods of detecting software vulnerabilities in a computer program by analyzing the compiled code and optionally the...
VIRUS CO-PROCESSOR INSTRUCTIONS AND METHODS FOR USING SUCH
Circuits and methods for detecting, identifying and/or removing undesired content are provided. According to one embodiment, a system includes a co-processor...
DYNAMICALLY OPTIMIZING PERFORMANCE OF A SECURITY APPLIANCE
A device may identify a set of features associated with the unknown object. The device may determine, based on inputting the set of features into a threat...
SOFTWARE SECURITY VIA CONTROL FLOW INTEGRITY CHECKING
Various technologies related to control flow integrity checking are described herein and can be used to greatly improve software security. During static...
RISK ASSESSMENT MODELING
One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to...
SYSTEM AND METHOD FOR AUTOMATED DATA BREACH COMPLIANCE
Computer-implemented methods and systems for data breach compliance are disclosed. Organization related information may be received. Breach information...
PROGRAM PROTECTION DEVICE
Disclosed is a device for protection a program. The device includes a protection domain unit including an encrypted protection domain, a start point display unit...
Processor, Processing Device, and Method for Creating Program
An object of the present invention is to provide a technique to reliably prevent execution of a malicious program due to a buffer overflow. In the present...
LIMITING ENTERPRISE APPLICATIONS AND SETTINGS ON DEVICES
Registering a computer system for use in an enterprise. A method includes receiving, from a device management infrastructure of the enterprise, an executable...
DEVICE, SYSTEM, AND METHOD OF THREE-DIMENSIONAL SPATIAL USER
Devices, systems, and methods of user authentication. A system includes a spatial challenge unit to distinguish between a human user and a non-human user. The...
COMPARING REAL-TIME MOVEMENTS TO PATTERN PROFILE BACKGROUND
Examples of comparing real-time movements to a pattern profile are disclosed. In one example implementation according to aspects of the present disclosure, a...
PORTABLE ELECTRONIC DEVICE WITH SECURITY SYSTEM
A PED configured to record and monitor access attempts and a method of recording and monitoring attempts to access a PED are provided. The PED includes a...
CONTENT PROTECTION SYSTEM USING BIOMETRIC AUTHENTICATION
The present disclosure is directed to a content protection system using biometric authentication. In general, a user may be authenticated using sensed...
VERIFYING A USER WITH BIOMETRIC DATA
A system and method of verifying a biometric variable of a handheld wireless device user includes: receiving at a wireless device a biometric variable measured...
MACHINE-LEARNING BEHAVIORAL ANALYSIS TO DETECT DEVICE THEFT AND
UNAUTHORIZED DEVICE USAGE
The disclosure relates to machine-learning behavioral analysis to detect device theft and unauthorized device usage. In particular, during a training phase, an...