At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,122,868 |
Method for securing a transaction performed with a programmable portable
device A method for securing a transaction between a transaction device and an external device is described. The transaction device includes a communication... |
US-9,122,853 |
Location determination for user authentication User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two... |
US-9,122,686 |
Naming service in a clustered environment Within a cluster, when a new server node joins the cluster, an indication of the new server node has joined is received by at least one server node in the... |
US-9,122,633 |
Case secure computer architecture Two computing subsystems are disclosed, one a control subsystem, the other a user subsystem, each using engines with augmented conventional instruction sets,... |
US-9,122,600 |
Systems and methods for remote monitoring in a computer network Systems and methods for providing automated problem reporting in elements used in conjunction with computer networks are disclosed. The system comprises a... |
US-9,122,534 |
Secure application partitioning enablement A computer implemented method, data processing system, and computer program product for configuring a partition with needed system resources to enable an... |
US-9,121,957 |
Radiation modulation in a security examination apparatus Radiation flux can be adjusted "on the fly" as an object (204) is being scanned in a security examination apparatus. Adjustments are made to the radiation flux... |
US-9,121,802 |
Method for characterizing integrated circuits for identification or
security purposes A method of detecting small changes to a complex integrated circuit measuring RF/microwave scattering parameters between every pin over a wide frequency range.... |
US-9,120,345 |
Printer for automatic packing machine and method of controlling the same The present disclosure provides a printer for an automatic packing machine, which employs a ribbon cartridge to facilitate replacement of a ribbon tape and... |
US-9,119,072 |
Method and apparatus to authenticate a personal device to access an
enterprise network In an embodiment, a device includes a processor to initialize a first wireless communication path with a computation device and initialize a second wireless... |
US-9,119,067 |
Embodiments of a system and method for securely managing multiple user
handles across multiple data processing... A system and method for are described for securely linking a phone number and user identification code in a directory database. A computer-implemented method... |
US-9,119,061 |
Integrated wafer scale, high data rate, wireless repeater placed on fixed
or mobile elevated platforms Methods and systems are provided for relocatable repeaters for wireless communication links to locations that may present accessibility problems using, for... |
US-9,118,754 |
System and method for providing a public/private telephone number system This invention shows a method for operating a voice communications network that comprises dynamically associating a private number with at least one public... |
US-9,118,712 |
Network communication system with improved security A computer network communication method and system wherein software rendering software is interposed in the data communication path between a browser running on... |
US-9,118,706 |
Using imported data from security tools A device may create a new project that includes criteria, import findings from a group of different network security tools into the new project based on the... |
US-9,118,689 |
Archiving systems and methods for cloud based systems A cloud based security method and processing node includes monitoring data traffic between a user and an external network, wherein the monitoring is performed... |
US-9,118,675 |
3D cloud lock In embodiments, a method of securing access to a computer memory and other computer resources includes authoring a 3D projection of data by a registering user... |
US-9,118,673 |
Methods and systems for secure key entry via communication networks According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be... |
US-9,118,666 |
Computing device integrity verification An integrity verification process is performed by an integrity verification module of a client computing device. When the computing device is powered-up, but... |
US-9,118,665 |
Authentication system and method A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided... |
US-9,118,654 |
Methods and systems for compliance monitoring in secure media-based
conferencing Methods and apparatuses, including computer program products, are described for compliance management of media-based (e.g., video and/or audio) conference... |
US-9,118,649 |
Method and system for an electronic device with integrated security module Methods and systems for processing Ethernet data are disclosed and may comprise receiving Ethernet data via a single gigabit Ethernet IP telephone chip. A... |
US-9,118,642 |
Asset streaming A device streams assets to network-based storage, and servers administering the network-based storage operate to notify other authorized devices that the assets... |
US-9,118,639 |
Trusted data processing in the public cloud Generally, this disclosure describes a system and method for trusted data processing in the public cloud. A system may include a cloud server including a... |
US-9,118,631 |
Mixing secure and insecure data and operations at server database Processing a query, includes, at a client, receiving a user-generated query having a plurality of recognizable terms, securing the user-generated query to... |
US-9,118,555 |
Secure unauthenticated virtual local area network A networking apparatus is used in connection with a virtual local area network (VLAN). The networking apparatus includes a control circuit and a policy circuit.... |
US-9,118,464 |
Set of servers for "machine-to-machine" communications using public key
infrastructure A set of servers can support secure and efficient "Machine to Machine" communications using an application interface and a module controller. The set of servers... |
US-9,118,356 |
Data transport in portable electronic devices The described embodiments relate generally to a dielectric wave guide interconnect for an electronic device including a first routing circuit, a second routing... |
US-9,117,487 |
Method and system for disc authentication and security A method and apparatus for disc authentication are disclosed. The authentication method includes measuring at least one physical property of a data disc, which... |
US-9,117,328 |
Automated banking machine that operates responsive to data In an example embodiment, an automated banking machine is provided which may comprise a trusted platform (TP) including a trusted platform module (TPM) in a... |
US-9,117,210 |
Systems and methods for randomized mobile payment Systems and methods for improving security in mobile payment systems are described. A user device may be operated to request temporary account data for an... |
US-9,117,153 |
Data carrier having a contact plate with printing thereon A data carrier having a main card body and a contact plate included on a surface of said main card body, wherein an area of the contact plate has a printed... |
US-9,117,095 |
Data security for digital data storage A computing system includes data encryption in the data path between a data source and data storage devices. The data encryption may utilize a key which is... |
US-9,117,090 |
System and method for a secure data collection system The system may provide for the collection of data in a heterogeneous network, long term secure storage of the data, and secure transfer of the data to an... |
US-9,117,087 |
System and method for creating a secure channel for inter-application
communication based on intents System and method for creating a secure channel for inter-application communication based on the messaging system called Intents in the Android OS are... |
US-9,117,084 |
Methods, systems, and computer readable media for measuring detection
accuracy of a security device using... Methods, systems, and computer readable media for measuring detection accuracy of a security device using benign traffic are disclosed. According to one method,... |
US-9,117,083 |
Managing booting of secure devices with untrusted software Normally, at the time of manufacturing, security may be provided to a device being manufactured through the loading of an operating system that has been... |
US-9,117,069 |
Real-time vulnerability monitoring A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system,... |
US-9,116,888 |
Customer controlled data privacy protection in public cloud Data to be submitted to a remote node is selectively protected. In various embodiments, an indication is received to protect a data value that is to be... |
US-9,116,857 |
Secure archive Storage apparatus (20) includes a memory (30) and an encryption processor (28), which is configured to receive and encrypt data transmitted from one or more... |
US-9,116,844 |
Data processing apparatus and method for analysing transient faults
occurring within storage elements of the... A data processing apparatus has a plurality of storage elements residing at different physical locations within the apparatus, and fault history circuitry for... |
US-9,116,841 |
Methods and systems for securely transferring embedded code and/or data
designed for a device to a customer The invention relates to methods and systems for securely transferring embedded code or data to a customer, in particular to methods and systems for securely... |
US-9,116,840 |
Semiconductor device and data processing method A semiconductor device has: as security states to which the nonvolatile memory device can transition, an unprotected state in which, when secret information is... |
US-9,116,711 |
Exception handling in a data processing apparatus having a secure domain
and a less secure domain Processing circuitry can operate in a secure domain and a less secure domain. In response to an initial exception from background processing performed by the... |
US-9,115,512 |
"Match" controlled container A secure safety container is made up with a base and a cover that can be locked together by an electric operated lock carried by the container. The top and base... |
US-9,114,721 |
Electric power information management apparatus, electric power
information management system, and electric... An electric power information management apparatus includes a power meter that measures electric power data on electric power to be supplied from a storage... |
US-9,113,776 |
Systems and methods for secure portable patient monitoring A patient monitoring system that enables a healthcare provide to request access to patient data via interaction directly with a local patient monitor and... |
US-9,113,492 |
Method and apparatus for transmit priority determination within a link A method, computer program product, and an apparatus for a transmit priority distributed backoff are provided. The apparatus forms a peer-to-peer communication... |
US-9,113,282 |
Mobile core client architecture Multiple types of applications, electronic forms, electronic forms data instances, network services and, network services are automatically managed by methods... |
US-9,113,226 |
Methods and systems for re-securing a compromised channel in a satellite
signal distribution environment A method implemented by a set top box that encrypts communications for a channel stacking switch (CS) using a public key of the CSS, the method comprising:... |