At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,830,483 |
Security and identification system and method using data collection and
messaging over a dynamic mesh network Various solutions for acquiring data across a deployed encrypted mesh network, using a digital security controlled, identification badge or tag. The... |
US-9,830,472 |
Method for handling privacy data The present invention aims to improve data protection against illegal access by a strong differentiation of the security level specific on a type of data so... |
US-9,830,469 |
Automated mechanism to secure customer data Systems, methods, and computer program products to perform an operation comprising monitoring a set of file access requests to a file from an application to... |
US-9,830,468 |
User interface for secure virtual document management system A user interface for a virtual file management system that provides user access to managed content on mobile devices. The system comprises storage domains... |
US-9,830,467 |
System, method and apparatus for securely storing data on public networks A system, method and apparatus that uses a quantum event-based, binary data generation apparatus operating in combination with a single-party or two-party,... |
US-9,830,465 |
Stateful data geofencing An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of... |
US-9,830,464 |
Format preserving encryption Encrypting data without losing their format is important in computing systems, because many parties using confidential data rely on systems that require... |
US-9,830,458 |
Discovery and classification of enterprise assets via host characteristics Techniques are presented herein for classifying a variety of enterprise computing resources based on asset characteristics. In particular, a computing asset,... |
US-9,830,433 |
Method, system and device for enhancing business information security The present invention provides a method for creating an electronic document file comprising monitoring creation and changes of an electronic document file,... |
US-9,830,327 |
Method, device, node and system for managing file in distributed data
warehouse A method, a device, a node and a system for managing file in distributed data warehouse are provided. The method includes: acquiring, by a data node, a deleting... |
US-9,830,280 |
Multiple access single SDIO interface with multiple SDIO units A system and method communicates with one of two or more secure digital input output (SDIO) units that only one SDIO unit responds when it is being addressed.... |
US-9,830,099 |
Secure erase of storage devices Techniques for providing secure erase of data stored on a storage device may be provided. For example, a storage device comprising a first layer of firmware... |
US-9,827,806 |
Data sheet for a security and/or value document The invention relates to a datasheet (1) for integrating into a preferably book-like security and/or value document. The datasheet (1) is made of at least two... |
US-9,825,980 |
Using a content delivery network for security monitoring A content delivery network includes a plurality of cache servers. Each cache server is configured to receive a request for content from a client system and... |
US-9,825,943 |
Location determination for user authentication User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two... |
US-9,825,925 |
Method and apparatus for securing sensitive data in a cloud storage system In one aspect, relates to a system and method of seamlessly encrypting data files before uploading them to a public cloud storage system by providing an... |
US-9,825,918 |
Controller area network (CAN) device and method for operating a CAN device Embodiments of a device and method are disclosed. In an embodiment, a Controller Area Network (CAN) device includes a security module connected between a CAN... |
US-9,825,819 |
Cloud service usage monitoring system A cloud service usage assessment system analyzes network traffic from an enterprise data network and generates cloud service usage analytics for the enterprise.... |
US-9,824,706 |
Rotary actuator with coil winding portions having opposing current flow
directions A rotary actuator for positioning a recording head in a data storage mechanism and that includes first and second cylindrical subassemblies separated by an air... |
US-9,824,559 |
Security sensing method and apparatus Optical data transceiver is used to illuminate a secured space with an optical data signal which has been modulated to contain a first data sequence. One or... |
US-9,824,546 |
Banking system controlled responsive to data bearing records A card actuated automated banking machine (10) is operative to carry out financial transactions responsive to data included on user cards. The banking machine... |
US-9,824,531 |
Progressive configuration device, system and method for gaming devices A device, system and method are set forth which provides for auto-configuration of progressive jackpot gaming linkages. Gaming terminals may be provided with... |
US-9,824,514 |
Applying geographical limitations to control actions of a security system Apparatus for applying geographical limitations to control actions of a security system is described. The apparatus receive location data from a user device,... |
US-9,824,509 |
Automobile modification system providing security and fault tolerance
support The disclosure includes a system and method for providing security or fault tolerance support for an automobile or an element of an automobile. The system may... |
US-9,824,402 |
Time clock for tracking employees Methods and systems are described for employee time entry using an automation and security system. An apparatus for employee time entry includes a processor, a... |
US-9,824,399 |
Secure data validation system An automated validation system validates whether a property of a policyholder receiving at least one insurance benefit is currently receiving remote monitoring... |
US-9,824,352 |
Augmented smart tag security apparatuses, methods and systems The AUGMENTED SMART TAG SECURITY APPARATUSES, METHODS AND SYSTEMS ("ASTS") transform video and other media inputs of POS terminals and markers associated with... |
US-9,824,282 |
Security camera system using power supply by electromagnetic induction
scheme A security camera system using a power supply by an electromagnetic induction scheme comprises; a CT core detachably installed on a power transmission and... |
US-9,824,243 |
Model-based runtime detection of insecure behavior for system on chip with
security requirements A runtime classifier hardware circuit is incorporated into an electronic device for implementing hardware security by storing a support vector model in memory... |
US-9,824,214 |
High performance software vulnerabilities detection system and methods This invention teaches a system and methods of detecting software vulnerabilities in a computer program by analyzing the compiled code and optionally the source... |
US-9,824,199 |
Multi-factor profile and security fingerprint analysis A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated... |
US-9,824,195 |
Calculating consecutive matches using parallel computing Methods and systems for determining consecutive matches are provided. According to one embodiment, a class definition and a data stream are received by a... |
US-9,824,107 |
Tracking changing state data to assist in computer network security A session table includes one or more records, where each record represents a session. Session record information is stored in various fields, such as key... |
US-9,820,285 |
Signal transmission/reception method and apparatus of D2D terminal The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates... |
US-9,820,196 |
Mobile communication system, radio base station, and mobile station A mobile station UE is enabled to perform appropriate security processing when the mobile station UE connected to a plurality of radio base stations eNB... |
US-9,820,184 |
Methods and apparatus for secure connectionless uplink small data
transmission Certain aspects of the present disclosure generally relate to techniques for secure connectionless uplink transmissions by a wireless device. Such techniques... |
US-9,820,182 |
Method for enabling control of data packet flows belonging to different
access technologies The present invention relates to embodiments of nodes and methods in a node in a data telecommunication network. The method and embodiments thereof enables... |
US-9,820,120 |
Mobile security technology In one implementation, a computer-implemented method includes determining a location of a mobile computing device using one or more of a plurality of data... |
US-9,819,807 |
System and method for real-time analysis of network traffic A method for detecting and intercepting at least one of fraud, security breach, intrusion or misuse of network resources monitors at least one of a plurality of... |
US-9,819,759 |
Inter-site integration platform for communication between social
networking sites A method, system, and computer program product for data mining and analytics from social networking sites. One method commences upon receiving a social event... |
US-9,819,747 |
Chirp networks A network combining wireless and wired elements is described, using a multi-slot modular mesh node to house diverse transceiver elements (e.g. IR, Wi-Fi,... |
US-9,819,685 |
Method and system for identifying security risks using graph analysis Methods, systems, apparatus, and non-transitory computer readable media are described for identifying users who are likely to have unauthorized access to secure... |
US-9,819,679 |
Hardware assisted provenance proof of named data networking associated to
device data, addresses, services, and... A system of delivering data content with hardware assisted provenance proof in named data networking (NDN). The system comprises a data content server with a... |
US-9,819,675 |
Secure communications smartphone system Methods, systems, and non-transitory data storage media are provided for secured communications where biometrics are used to secure communications sent over a... |
US-9,819,663 |
Data protection file system Protecting content is disclosed. A request for a file system operation is intercepted. A user-defined callback that corresponds to the file system operation is... |
US-9,819,656 |
Method for secure communication using asymmetric and symmetric encryption
over insecure communications Data may be protected using a combination of symmetric and asymmetric cryptography. A symmetric key may be generated and the data may be encrypted with the... |
US-9,819,651 |
Secure voice and text communication A computerized security peripheral device has a central processing unit (CPU), a power supply, a digital memory; a microphone; a speaker apparatus; first... |
US-9,819,650 |
Homomorphic encryption in a healthcare network environment, system and
methods A system and method for homomorphic encryption in a healthcare network environment is provided and includes receiving digital data over the healthcare network... |
US-9,819,646 |
Secure device and proxy for secure operation of a host data processing
system Secure device and proxy operation include generating, using a processor, a first proxy and a first proxy companion paired with the first proxy and providing the... |
US-9,819,613 |
Bi-directional NAT traversal using endpoint assigned discriminators A method for creating a secure link between any two endpoints in a network comprises: assigning a unique identifier to each endpoint of a network; for each... |