At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Asset tracking system
Embodiments of the subject technology provide a multi-tenant asset tracking system that disambiguates or filters RFID tags.
RFID communication system and method for controlling same
Described herein is a system and method for the continuous operation of an RFID communication system in a user-friendly manner and to ensure the reliability...
Facilitating gesture-based association of multiple devices
Gesture-based association of multiple devices may be facilitated, which may effectuate presentation of content related to associated devices. Gesture detection...
RFID system and method
An RFID system includes an RFID antenna assembly configured to be positioned on a product module assembly of a processing system. The product module assembly is...
Information RFID tagging facilities
In embodiments of the present invention improved capabilities are described for a system of information RFID tagging facilities comprising a first radio...
Magnetic helical physical unclonable function measured above flight
A helical physical unclonable function is disclosed. The helical physical unclonable function may be used to authenticate a supply item for an imaging device....
Transaction terminal device
In a transaction terminal device, a magnetic head module that supports a magnetic head which reads a magnetic card, and a plurality of communication antennas...
Programmable logic controller
A programmable logic controller includes a device that stores therein data, an authentication-information storage unit that stores therein authentication...
Privacy server for protecting personally identifiable information
A privacy server protects private information by substituting a token or an identifier for the private information. The privacy server recognizes that a...
Method of managing map information, navigation system, information
terminal, and navigation device
A method of managing map information including: attaching a retrieval identifier, according to input information, to map information which is obtained by...
System and method of owner application control of electronic devices
Systems and methods of owner application control of an electronic device are provided. Owner application control information is stored on the electronic device...
In some example implementations, there is provided a method including determining, from a received request, one or more attributes; sending, by a permission...
Information processing system, information processing apparatus, storage
medium having stored therein...
An example of an information processing system includes first storage means for storing saved data of an application and a second storage means. The information...
Systems and methods for enforcing third party oversight of data
A modifiable server is utilized to reliably seal and unseal data according to a measurement of the server, by structuring the server to have a modifiable...
Methods and systems for enabling media guidance application operations
based on biometric data
Methods and systems are disclosed herein for encouraging particular behavior or performing particular actions based on biometric data of a user. Specifically,...
Develop and deploy software in multiple environments
Developing, deploying, and operating an application in a plurality of environments is disclosed, including: defining runtime specific configuration information...
Display device and method for controlling the same
A display device and a method for controlling the same are disclosed. The method for controlling a display device comprises the steps of displaying a control...
A request, from a requester, is received to view user information on a user's personal site associated with a user. A relationship is determined between the...
Accessing protected content for archiving
According to one embodiment of the present invention, a system for accessing protected content includes a first computing device with at least one processor....
Display system, display method, display terminal and non-transitory
computer-readable recording medium stored...
A display system for displaying a document includes a tablet terminal and a head mounted display device (HMD). The tablet terminal includes a display device...
Instructions processors, methods, and systems to process secure hash
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
Detecting exploitable bugs in binary code
Systems and methods for performing hybrid symbolic execution to detect exploitable bugs in binary code are described. In some example embodiments, the systems...
Secure factory data generation and restoration
In various embodiments, methods, devices and systems for securely generating, sealing, and restoring factory-generated calibration and provisioning data for an...
Snoop-based kernel integrity monitoring apparatus and method thereof
A snoop-based kernel integrity monitoring apparatus and a method thereof are provided. More particularly, provided are a kernel integrity monitoring apparatus...
Malware family identification using profile signatures
A potential malware sample is received from a security device at a server associated with a security cloud service. The sample is executed in a sandbox...
Malware detection system and method for compressed data on mobile
A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables,...
Detecting duplicate malware samples is disclosed. A first guest clock is set to a first value in a first virtual machine instance. A first malware sample is...
Systems and methods of identity protection and management
In an embodiment, a computing system, such as a monitoring computer, receives a request from a user to monitor an account of the user with an online service...
Extensible platform for securing apps on a mobile device using policies
and customizable action points
An extensible platform gives app developers more control and granularity when developing apps and making them secure. App developers are able to use an app...
Information processing apparatus, information processing method, and
non-transitory computer-readable medium
An information processing apparatus comprises: a manual login unit configured to display a login screen, and to perform user authentication using user...
Method of mutual authentication between a radio tag and a reader
A method of mutual authentication between a radio tag and a radio reader. The method includes: authentication of the tag by the reader, implemented on a first...
Toolbar for single sign-on and non-single sign-on sites, applications,
systems, and sessions
A method including receiving a request to connect to a single sign-on site, a non-single sign-on site, a system, a mainframe, or to use a mainframe or user...
Computer application security
A method of providing restricted access to computer application information via a computing device includes: displaying a limited-access icon on a display of...
Identification to access portable computing device
A portable computing device receives an identity card and restricts access to the portable computing device if the identity card is unassociated with the...
System and method for implicitly resolving query scope in a multi-client
and multi-tenant datastore
An apparatus comprising a multi-tenant datastore and a processor coupled to the multi-tenant datastore, wherein the processor is configured to receive a request...
System, method and computer program product for access authentication
A method and technique for access authentication includes: responsive to receiving an access request from a user for a secure resource, logging an Internet...
Correlated display of biometric identity, feedback and user interaction
Aspects of the subject disclosure are directed towards providing feedback to users of multi-user system that has biometric recognition capabilities, so that a...
Biometric authentication device, biometric authentication method and
computer readable, non-transitory medium
A biometric authentication device including: a data-for-matching generation portion generating a data for matching from biometric information; an update-demand...
Single step transaction authentication using proximity and biometric input
A system and method provide efficient, secure and highly reliable authentication for transaction processing and/or access control applications in which only...
System and method for distinguishing human swipe input sequence behavior
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
System and method for managing application program access to a protected
resource residing on a mobile device
A computer-implemented method for managing application program access to a protected resource residing on a mobile device is provided. The method includes...
Managing software deployment
The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of...
Electronic content management and delivery platform
An education digital reading platform provides aggregation, management, and distribution of digital education content and services. The platform ingests content...
Method and system for confidentially providing software components
A method and system for confidentially providing a software component which is encrypted using a secret cryptographic key of a software component manufacturer,...
Sustained data protection
Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access...
Systems and methods for recognizing behavorial attributes of software in
A computer-implemented method for recognizing behavioral attributes of software in real-time is described. An executable file is executed. One or more runtime...
Prescription control system
A medication dispensing device comprises a case having a front panel, a back panel and sidewalls. The case defines a medication holding area and a dosage...
Medication dosage dispensing system and methods having customization and
modification for medicine dispensing...
A device for monitoring and correction of a functional condition of a human body on the basis of measurement of thresholds of temperature painful sensitivity...
Decision support recommendation optimization
Systems, methods, and computer-readable media are provided for facilitating clinical decision making by directing the emission of computer-generated health-care...