At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for the transfer of a money amount by using a two
dimension image code
The present disclosure concerns a method for transferring a money amount by using a two-dimension image code. It provides that the registration of the transfer...
Human body security inspection method and system
The present invention provides a human body security inspection method and system. The method comprises: retrieving in real-time scanning row or column image...
System and method for security and privacy aware virtual machine
A checkpointing method for creating a file representing a restorable state of a virtual machine in a computing system, comprising identifying processes...
Secure application access system
A proxy server creates an index of keywords, receives an encrypted record, decrypts the received encrypted record as decrypted data and, when a keyword in the...
Systems and methods for securing data
Systems and methods for securing data are disclosed. An administrative system may create a secure configuration. The secure configuration may disable...
System and method for remotely assigning and revoking access credentials
using a near field communication...
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have...
Unified online content manager apparatuses, methods, and systems
Apparatuses, methods, and systems for transforming user identification information and user selection data inputs into a profile data output, a generated query...
Information processing apparatus and computer program product
According to an embodiment, an information processing apparatus includes a secure OS, a non-secure OS, and a monitor. The monitor is configured to switch...
Method and apparatus for authorizing a print device to perform a service
A document printing system may include a print engine, a controller coupled to the print engine and a communication port in electrical communication with the...
Robust data replication
Disclosed is a system for replicating data. The system may comprise a plurality of nodes preferably organized in groups with one of the nodes acting as a...
Systems and methods for presenting actual data on a display device based on eye-tracking data. An eye-tracking engine receives sensed data from an eye-tracking...
Secure smartphone-operated gun lock with means for overriding release of
A gun locking and unlocking device, which may be configured to be disposed on or in a gun to alternatively prevent or enable firing, includes a data receiver, a...
System and method for capturing exercise data
The system and method for capturing exercise data may include offsetting an imaginary longitudinal axis of a center beam of a workout bar and an imaginary...
Coexistence of multiple radios in a medical device
A computer-implemented diabetes management system is provided that supports enhanced security between a diabetes care manager in data communication with a...
Remote provisioning of 3GPP downloadable subscriber identity module for
virtual machine applications
A method is presented of providing a subscriber identity for the provision of services on behalf of the subscriber in a virtual computing environment. The...
Client device with secure clock and methods for use therewith
A client device includes a network interface that is coupled to receive media content and server time data via a network, wherein the media content is protected...
Light device has built-in digital data system for record image, sound
A Light device having built-in digital data means is powered by an unlimited power source for a lamp-holder, LED bulb, or light device connected to unlimited...
System and method for guaranteed high speed fax delivery
Described herein is a fax processing system that improves the speed and reliability of fax transmissions via a data communications network and provides a new...
Intelligent remediation of security-related events
An information processing system implements an intelligent remediation system for security-related events. The intelligent remediation system comprises a...
Method and system for providing security for universal plug and play
operations in a home network environment...
A method and system for providing security to Universal Plug and Play (UPnP) operations in a home network environment based on ownership rights where a request...
Method and apparatus for interworking authorization of dual stack
A method and apparatus for dynamic home address assignment by a home agent in multiple network interworking. The invention provides a method and apparatus send...
Communication system and transmission unit employed in same
Provided are a communication system that is capable of acquiring information having a relatively large data amount by a transmission unit while securing a...
Deletion of content in digital storage systems
A data processing and storage apparatus has a hardware security module and a data storage medium storing encrypted data objects and a hierarchical data...
Electronic device and load center including the same
An electronic device includes a housing defining an exterior shape of the electronic device, a processor, a power supply structured to receive line power and to...
System and method for implementing internet-based games wherein a
plurality of different games share a common...
A system and computer implemented method for conducting play of Internet-based lottery games includes providing players with a plurality of different...
Method and apparatus for secure execution using a secure memory partition
A processor includes a plurality of general purpose registers and cryptographic logic to encrypt and decrypt information. The cryptographic logic is to support...
Secure event log management
A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A...
Policy enforcement with associated data
Requests submitted to a computer system are evaluated for compliance with policy to ensure data security. Plaintext and associated data are used as inputs into...
System and method for managing collaboration in a networked secure
In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations,...
Data processing based on two-dimensional code
The present disclosure provides example methods and apparatuses of data processing based on a two-dimensional code. The two-dimensional code is generated upon...
Firmware update system for video security equipment
A firmware update system includes video security equipment and an update server. When receiving an error report from the video security equipment, the update...
Object shadowing in head worn computing
Aspects of the present disclosure relate to a secure data transfer method, including identifying a second head worn computing system ("HWC") in close proximity...
Automatic electronic communication system for tracking firearms
This invention provides a system, method and algorithm for automatic electronic communication between a firearm formed with a location tracking system and a...
Security mechanism for mobile users
A wireless communication device for use in a cellular network. The device comprises a radio interface for enabling communication between the device and a base...
System and method for authentication and key exchange for a mobile device
via spectrally confined wireless...
An architecture, system and associated method and apparatus for securely communicating authentication data to a communication device. In one embodiment, the...
Monitoring smart devices on a wireless mesh communication network
A surveillance system and method with at least one wireless input capture device ICD(s) and a corresponding digital input recorder (DIR) and/or another ICD,...
Vehicle service system optical target assembly calibration
A machine vision vehicle wheel alignment system for acquiring measurements associated with a vehicle. The system includes at least one imaging sensor having a...
Facilitating quality of service and security via functional classification
of devices in networks
Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device of...
Data analytics and security in social networks
A method for securing a social network account assigned to a member is provided. The method may include determining at least one social network account assigned...
Prioritizing security findings in a SAST tool based on historical security
A cloud-based static analysis security tool accessible by a set of application development environments is augmented to provide for anonymous knowledge sharing...
Social network security monitoring
A computer-implemented method includes security settings data associated with one or more profiles of a protected social entity on one or more social networks...
HTML security gateway
A technique allows a client computing system with a web browser to receive a web page in response to transmitting a request for content. The web page may...
Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
Compliant authentication based on dynamically-updated credentials
A system, method and a computer-readable medium for authenticating a user in a live manner in non-face-to-face transactions, including a user downloading an...
Providing a security mechanism on a mobile device
Disclosed are methods, apparatus, systems, and computer program products for providing a security mechanism on a mobile device before performing an action on a...
Auditing and permission provisioning mechanisms in a distributed secure
The embodiments described herein describe technologies for ticketing systems used in consumption and provisioning of data assets, such as a pre-computed (PCD)...
System and device for consolidating SIM, personal token, and associated
applications for selecting a...
The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification....
Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
Method for secured data processing
A method for facilitating secured data processing, the method includes generating, for each client out of at least two clients, a private key, and a public key;...
System and method for limited records access for event scheduling
The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a...