At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Information processing apparatus, information processing method and
information processing program
Information corresponding to a face image preferred by a user as a whole is presented while considering a face element preferred by the user. An information...
Fingerprint sensing device with protective coating
A sensing device comprising a plurality of sensing elements, each of the sensing elements being configured to provide a signal indicative of an electromagnetic...
Anti-shock relief print scanning
One or more techniques, devices and/or systems are disclosed for mitigating a perceived electrical sensation for a relief print scanning device. A current...
Capacitive fingerprint sensor with sensing elements comprising timing
The present invention relates to a capacitive fingerprint sensing device for sensing a fingerprint pattern of a finger, the capacitive fingerprint sensor...
Scanner with adjustable field of view
A scanner having a single integrated camera and a mechanism to adjustable alter the field of view of the camera to provide a field of view coverage area...
Method and system for detecting a correction pattern in a QR code
Method and system for detecting a correction pattern in a QR code are disclosed. In the detection of a correction pattern, coordinates of the correction pattern...
3D-structured pattern reading system
A 3D-structured pattern reading system, including: an object having a front face formed with a 3D-structured pattern for representing predetermined data; and a...
Compartmentalized smart refrigerator with automated item management
A smart refrigerator system includes a plurality of compartments for storing food items and one or more tag readers. The smart refrigerator system may read a...
RFID reader device and antenna device
An RFID reader device and an antenna device have a first antenna implemented as a near-field antenna, wherein the first antenna has a first dual strip line. The...
Network cable tracking system
Embodiments relate to a system and method of identifying a cable terminal plug and port on a computer system. An aspect includes a method having a step of...
Method and system for correctly identifying specific RFID tags
A system and method for identifying a specific RFID tag includes RFID reader circuitry, such as within an RFID reader, configured for sending and receiving RF...
Anti-recording card reading device
This anti-recording card reading device includes: a magnetic card reading head having a data reading terminal and a flexible circuit board, where the flexible...
Card reader with power efficient architecture that includes a power supply
and a wake-up circuit
These and other objects of the present invention are achieved in a card reader with a read head positioned in a housing. The read head is configured to be...
Localizing tagged assets in a configurable monitoring device system
In a tag communication system, a method includes determining range information representative of a distance between two tags, and estimating parameter...
Integrated unit for reading identification information base on inherent
The invention provides an authentication unit for reading identification and/or authentication information from a tag or object. The authentication unit...
Methods, systems and apparatus to secure devices via physical and/or
Methods, systems, apparatus and articles of manufacture are disclosed to secure devices. An example disclosed apparatus includes a platform detector to...
Feature enablement within a printer
In one embodiment, an apparatus that removably connects to a first printer is validated, the validating including comparing first data stored within the...
Prime field elliptic cryptography processor
A system including a first circuit and a second circuit. The first circuit includes a multiplier array to receive a first operand and a second operand and...
Pooling entropy to facilitate mobile device-based true random number
A mobile device operating system pools any available entropy. The resulting entropy pool is stored in device memory. When storing entropy in memory, preferably...
Security data path verification
A formal verification approach verifies data access and data propagation paths in a circuit design by proving the unreachability of path cover properties of the...
Method and apparatus to perform online credential reporting
Embodiments of the invention provide a process for displaying a graphical indicator on an Internet enabled device which conveys relationships between an entity...
Secure access to running client application features from a browser
A secure access is provided to a plurality of software application features associated with a plurality of software applications running on a user's device,...
Information processing apparatus
According to one embodiment, an information processing apparatus includes a nonvolatile semiconductor memory and a processor. The nonvolatile semiconductor...
Magnetic stripe reader tamper protection
A technique for tamper protection of incoming data signal to an electronic device is disclosed. An intentional interference signal is generated and modulated...
Device, system and method for securing and comparing genomic data
The present disclosure presents methods, systems, and devices for encrypting and comparing genomic data. The comparison of genomic data allows the owner of the...
Method and system for run-time dynamic and interactive identification
software authorization requirements and...
A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using...
Protection of state data in computer system code
Method and system are provided for protecting state data of computer system code. The computer system code may be operating system code, subsystem code or...
Integration user for analytical access to read only data stores generated
from transactional systems
The technology disclosed preserves the tenant specificity and user specificity of the tenant data by associating user IDs to complementary special IDs referred...
Environment-aware security tokens
The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about...
System for and method of managing access to a system using combinations of
The present invention is directed to systems for and methods of controlling access to computer systems. A method in accordance with the present invention...
Extensible and/or distributed authorization system and/or methods of
providing the same
In certain example embodiments, an extensible and/or distributed security system is provided. In certain example embodiments the security system provides...
Time based access control in social software
An embodiment of the invention provides a method for controlling access to content in a social networking website, wherein a connection is established between a...
Secure file drawer and safe
An online file storage system comprising individual secure file drawers and safes is disclosed for securely storing and sharing confidential files. The system...
Access control for a document management and collaboration system
A method and apparatus for controlling access to documents retained by a document management and collaboration system is disclosed. The document management and...
Control and enforcement of access of user data
Control and enforcement of access of user data are described, including receiving a request from an application to access data associated with a user;...
Secure data parser method and system
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention...
Disclosed herein is an information processor that allows for manipulation of raw data to a certain extent with an application program while protecting the...
System, method and computer product for fast and secure data searching
A system for fast secured searching may include a user interface, a web layer configured for executing application logic and configured for interacting with a...
General protocol for proactively secure computation
Described is a system for proactively secure multi-party computation (MPC). Secret shares representing data are constructed to perform computations between a...
Computer system vulnerability analysis apparatus and method
Apparatus and methods to evaluate computing systems' vulnerability implement a series of steps wherein a system may be selected, and a specific component...
Method and apparatus for analyzing and detecting malicious software
A method for providing analysis and detection of malicious software may include directing a comparison of patterns within sample code to a predetermined set of...
Fingerprint analysis for anti-virus scan
Disclosed are systems and methods for fingerprint analysis for anti-virus scanning. In an embodiment, a method of scanning for infected data items is disclosed....
Techniques for enabling co-existence of multiple security measures
Various embodiments are directed enabling anti-malware software to co-exist with protective features of an operating system. An apparatus may include a...
Memory arrangement and method for detecting an attack on a memory
According to various embodiments, a memory arrangement is described having a first bit line, a first precharge device for precharging the first bit line to a...
Methods, systems, and computer readable mediums for providing supply chain
Methods, systems, and computer readable mediums for providing supply chain validation are disclosed. According to one exemplary embodiment, a method for...
Inhibiting denial-of-service attacks using group controls
A processor receives within a user interface of a process server on a first computer system a first signal that includes a request to create an isolated...
Block storage virtualization on commodity secure digital cards
One embodiment of the present invention provides a system that facilitates storing an image file of a virtual machine on a potentially unprotected flash storage...
Method and system for tracking machines on a network using fuzzy guid
A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality...
Method and system for securely accessing different services based on
single sign on
An embodiment for securely accessing services of a service provider based on single sign on. The user device is authenticated by an authentication server if the...
Performing authentication based on user shape manipulation
In one embodiment, an apparatus comprises: a first logic to receive a user selection of an authentication shape, the authentication shape to be displayed on a...