Class / Patent application number | Description | Number of patent applications / Date published |
340500740 | Access to electrical information | 30 |
20080238612 | Direct Peripheral Communication for Restricted Mode Operation - A computer that self-administers operating in restricted and unrestricted operating modes boots from a main processor and operates normally in the unrestricted operating mode and operates from an alternate processor in a security module in the restricted operating mode. The alternate processor may communicate directly with peripheral devices such as a display controller and keyboard. Because the main processor is not used and may not even be started in the restricted operating mode, viruses, shims, and other related attacks are virtually eliminated. In one embodiment, the security module may operate as a PCI bus master when in the restricted operating mode. | 10-02-2008 |
20080278285 | RECORDING DEVICE - When a recording media | 11-13-2008 |
20080303631 | Mass Storage Device With Locking Mechanism - Embodiments of a mass storage device having a locking mechanism are described. The mass storage device includes a wireless reader to receive identification data from a wireless transponder, and to determine if the identification data matches a pre-stored data. The mass storage device includes a first controller device to enable access to at least a portion of a mass storage unit when the wireless reader determines that the identification data matches the pre-stored data. In one embodiment, a method of locking a mass storage device is described. The method includes receiving first identification data from a first wireless transponder at a mass storage device and unlocking the mass storage device upon determining that the first identification data matches a first pre-stored data. | 12-11-2008 |
20090040020 | METHOD, COMPUTER PROGRAM AND APPARATUS FOR CONTROLLING ACCESS TO A COMPUTER RESOURCE - A computer message that is being sent from a consumer to a computer resource is checked to determine whether the computer message meets all of a set of one or more specified conditions. If so, the computer message is compared with a baseline, the baseline containing a set of computer messages which have been classified according to whether or not each of the computer messages of the set represents acceptable behaviour in the context of the computer resource. If the comparison with the baseline determines that the computer message represents acceptable behaviour in the context of the computer resource, the computer message is permitted to be passed to the computer resource. | 02-12-2009 |
20090045914 | WRITE-PROTECTION MODULE AND METHOD FOR STORAGE DEVICE - A write-protection module for a storage device and the method thereof are disclosed. The write-protection module includes a power supply circuit, a fingerprint sensor, a database, and a microprocessor. The microprocessor for receiving the working power produced by the power supply circuit to maintain operation is respectively coupled to the power supply circuit, the fingerprint sensor, and the database. The fingerprint sensor receives the fingerprint input of a user, and the microprocessor receives the output signal of the fingerprint sensor and converts the output signal into an input cryptograph. Finally, the microprocessor compares the input cryptograph with a predetermined cryptograph stored in the database to produce a comparison information, and determines whether or not the user may access data. | 02-19-2009 |
20090206992 | Proximity-Based Healthcare Management System With Automatic Access To Private Information - A healthcare management system and method provide efficient and secure access to private information. A portable physical device, referred to herein as a Personal Digital Key or “PDK”, stores one or more profiles in memory. The biometric profile is acquired in a secure trusted process and is uniquely associated with an individual that is authorized to use and is associated with the PDK. The PDK can wirelessly transmit the identification information including a unique PDK identification number and the biometric profile over a secure wireless channel for use in an authentication process. The PDK is configured to wirelessly communicate with a reader. A provider interface coupled to the reader, and the reader is further configured to receive profile information from the PDK. The healthcare management system also includes an auto login server configured to communicate with the provider interface to allow access to information in a patient database. | 08-20-2009 |
20090251285 | USING PHYSICAL OBJECTS TO CONTROL ENABLEMENT/DISABLEMENT OF DEVICE FUNCTIONALITY - At least one N-sided physical object proximate to a computing device can be detected. Each side of the N-sided physical object can be associated with at least one enablement state for a functionality of the computing device. A side of the N-sided object that faces a reference plane can be sensed. An enablement state of a functionality of at least one computing device can be programmatically changed to correspond to an enablement state indicated by the N-sided physical object. | 10-08-2009 |
20090322476 | SYSTEM AND METHOD FOR ASSOCIATING AN ELECTRONIC DEVICE WITH A REMOTE DEVICE HAVING A VOICE INTERFACE - The disclosure provides a system and method for associating an electronic device with a remote electronic device. In the method at the remote device, an authentication process is initiated to authenticate the remote device to the electronic device. The authentication process includes: generating a pass key according to an authentication protocol followed by the remote device; and providing the pass key to a user through an output device on the remote device. The method also includes: waiting for the user to provide the pass key to the electronic device; and if the remote device receives a timely message from the electronic device indicating that the remote device has been authenticated, activating additional applications on the remote device to allow it to communicate with the electronic device. | 12-31-2009 |
20100060415 | Electronic entity with contact and remote communication means - An electronic entity includes contact communication elements ( | 03-11-2010 |
20100085149 | Systems and Methods for Mounting a Security Device - A mount according to the various aspects of the present invention for coupling to a provided object, releasably coupling a provided security device, and providing an information. The mount includes a body, a first coupler, a second coupler, a conductor, and a data carrier. The first coupler for coupling the body to the object. The second coupler for releasably coupling the body to the security device. The conductor for electrically coupling to the security device. The data carrier is positioned in the body and electrically couples to the conductor to provide the information via the conductor. The security device receives the information only while coupled to the second coupler. The data carrier remains in the body while the security device is decoupled from second coupler. The information comprises a unique identifier. | 04-08-2010 |
20100176920 | METHOD AND DEVICE FOR PROVIDING DIGITAL SECURITY - This invention relates to a method and system for providing digital security by means of a reconfigurable physical uncloneable function, RPUF. The RPUF comprises a physical system constituted by distributed components arranged to generate a first response when receiving a first challenge at a point of the physical system. The physical reconfiguring of the RPUF comprises redistributing the components such that they generate a second response, which differs from said first response, when again applying the first challenge at the point. The reconfiguration step is further utilized in providing secure storage for digital items. The digital item is data of any kind, including data that needs to be accessed and updated, i.e. which is dynamic in nature. The method is exemplified by implementations such as secure storage of a key, a secure counter and a seed generator. | 07-15-2010 |
20100207726 | Electronic Entity Capable of Communicating With a Reader and Method Used Within Such an Electronic Entity - An electronic entity includes a processing circuit ( | 08-19-2010 |
20110084800 | Access Authorization Method And Apparatus For A Wireless Sensor Network - An access authorization method and apparatus for a wireless sensor network comprises at least a base station and a wireless sensor network formed by a plurality of sensor nodes. After having obtained an access authorization of a user, the at least a base station issues a request message to a target sensor node in the wireless sensor network. The target sensor node requests at least a controlling node in the wireless sensor network for sensing data sensed by the at least a controlling node, and checks if the sensing data meets the requirements of the access authorization of the user. Whether the target sensor node responds with the required multimedia or not is based on the checking result. | 04-14-2011 |
20110234372 | INTERACTIVE PHONE MESSAGE CONTROL APPARATUS FOR A MOTOR VEHICLE - A motor vehicle includes control apparatus for establishing an interactive human-machine interface (HMI) between a vehicle driver and an on-board communication system that is wirelessly coupled to a nomadic communication device carried by the driver. The on-board communication system has the ability to activate the nomadic communication device to check for messages, and the interactive HMI includes a configurable display through which check-message inquiries are selectively communicated to the driver, and an input device selectively manipulated by the driver to accept a check-message inquiry. An HMI controller responsive to sensed vehicle operating condition data and driver manipulation of the input device determines if and when a check-message inquiry should be communicated to the driver. | 09-29-2011 |
20110248821 | Interlock System and Method - A network of interlocks and input devices and a system for tracking their use and control, in which each interlock and input device is associated with a machine which performs a process. Machines are associated with input devices by reading machine identifications from Data Storage Devices (DSDs) with input devices. To disarm an interlock prior to using a machine, the input device is used to read one or more DSDs containing information required to track the process. The input device sends the DSD data to a CPU which then sends an authorization signal to a machine interface. Upon receiving the signal, the machine interface enables the machine to be turned on. The CPU logs the process and DSD data. Once the operator turns off the machine, it cannot be restarted until the operator reads the DSDs required by the machine. | 10-13-2011 |
20110304428 | Security System For Managing Information On Mobile Wireless Devices - A security system is provided for managing information stored on mobile wireless devices upon exit from a building. The security system includes an exit system and a device management system. The exit system is configured to detect that a user has requested to exit a building. The exit system is also configured to detect that a particular mobile wireless device is in proximity to the user. The device management system is configured to determine, based upon policy data that specifies attributes of information that should not be removed from the building on mobile wireless devices, information on the mobile wireless device that is to be rendered inaccessible. The device management system is further configured to cause the determined information on the mobile wireless device to be rendered inaccessible. Rendering information on the mobile wireless device inaccessible may include, for example, deleting the information, encrypting the information or re-encrypting the information. | 12-15-2011 |
20120025950 | AUTHENTICATION METHOD AND ARRANGEMENT FOR PERFORMING SUCH AN AUTHENTICATION METHOD AND CORRESPONDING COMPUTER PROGRAM AND CORRESPONDING COMPUTER-READABLE STORAGE MEDIUM - The invention relates to an authentication method and an arrangement for performing such an authentication method and to a corresponding computer program and a corresponding computer-readable storage medium, said method particularly providing a simple and very cost-effective method for the authentication of persons upon the usage of services with the aid of mobile standard terminals without technical expansions such as RNID equipment or the like. For this purpose, it is provided that in the authentication method a terminal ( | 02-02-2012 |
20120038457 | IMAGE PROCESSING APPARATUS AND COMPUTER READABLE MEDIUM - An information processing apparatus includes a display control section that performs display control of a first operation screen for performing first operation and a second operation screen for performing second operation. The information processing apparatus also includes a control section that performs control of terminating the first operation screen or making the first operation screen invisible based on information as to whether or not the user needs to authenticate display of the first operation screen or display of the second operation screen when the second operation screen is displayed in a state in which the first operation screen is displayed. | 02-16-2012 |
20120112882 | SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS - The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader. | 05-10-2012 |
20120212323 | SYSTEMS AND METHODS FOR RULE-DRIVEN MANAGEMENT OF SENSOR DATA ACROSS GEOGRAPHIC AREAS AND DERIVED ACTIONS - The present disclosure relates to an information gathering method. The information gathering method includes identifying a location of a package, the location associated with one or more location-based restrictions on collecting data. The information gathering method also includes restricting access to sensor-collectable data associated with the package in accordance with the or more location-based restrictions. | 08-23-2012 |
20120218077 | SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS - The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader. | 08-30-2012 |
20120235789 | IC CARD, IC CARD MANUFACTURING METHOD, IC CARD ISSUING METHOD, AND COMMUNICATION METHOD - According to one embodiment, an IC card includes an IC module and a substrate. The IC module includes a plurality of communication units, a storage unit, and a controller. The storage unit stores first data, and stores an access condition for the first data. The controller permits, when the access condition includes information which permits an access to the first data based on a reception command received via a first communication unit of the plurality of communication units, an access to the first data based on a first command received via the first communication unit, and does not permits an access to the first data based on a second command received via a second communication unit of the plurality of communication units. | 09-20-2012 |
20130057384 | METHOD AND APPARATUS FOR SURVEILLANCE SYSTEM PEERING - A security installation positions a peering ability with a peer installation by establishing a peering agreement to define the conditions constituting a situation for which peering applies, and identifies the resources and assets which will be shared, as well as the duration of the peering, typically until the resolution of the exigent situation or circumstances that prompted the peering. Peering selectively couples security installations for monitoring a particular upon determining that a situation responsive to mediation has occurred within an area monitored by the security installation for monitoring an area. The security installation initiates a peering invitation to a peer installation, in which the peer installation is configured to share resources with the security installation for mitigating the cause of the situation. The resulting peered access provides communication between the peer installation and the security installation, the access being temporary and conditional on the exigency of the determined situation. | 03-07-2013 |
20130127595 | SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS - The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader. | 05-23-2013 |
20130154797 | APPARATUS AND METHOD FOR INTERACTION BETWEEN CONTENT AND OLFACTORY RECOGNITION DEVICE - Disclosed herein is an apparatus and method for interaction between content and an olfactory recognition device. In the method for interaction between an olfactory recognition device and a content device, the method allows the olfactory recognition device to interact with the content device. If a connection to the content device has been made to enable data communication with the content device, an open signal is transmitted to the content device. As a response to the open signal, an approval signal is received from the content device. A device information datasheet that is information about the olfactory recognition device is transmitted to the content device in response to the approval signal. An acknowledgement signal is received from the content device. | 06-20-2013 |
20130241695 | SECURE ELECTROMAGNETIC DATA STORAGE ELEMENT HAVING A SELECTIVELY DETERMIND SWITCHABLE SECURITY MODE - The apparatus of the present invention are directed to a selectively accessible electromagnetically resonant data storage element (implemented as a resonant tag, card, embedded element and/or similar devices), for inventory and facility control and management, for product tracking during transportation, for security purposes (e.g., personal identification (e.g., passports, driver's licenses), access control, etc.), and to facilitate various forms of electronic information interchange (for example in electronic commerce, such as payment card, tag etc.), that is selectively responsive to predetermined electromagnetic interrogation thereof, that comprises a novel connecting component and a security mode selection component, for a user to change from Always-ON to Always-OFF, then enabling selectively to ON and OFF for interrogatory access to resonant component, to protect from unauthorized interrogation thereof. | 09-19-2013 |
20140022056 | SYSTEM AND METHOD FOR PROVIDING SECURE TRANSACTIONAL SOLUTIONS - The present invention provides a method and system for verifying and tracking transactional information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader. | 01-23-2014 |
20140361872 | MOBILE WIRELESS COMMUNICATIONS DEVICE PROVIDING NEAR FIELD COMMUNICATION (NFC) UNLOCK AND TAG DATA CHANGE FEATURES AND RELATED METHODS - A mobile wireless communications device may include a near field communication (NFC) transceiver and a controller coupled with the NFC transceiver. The controller may be configured to receive tag data from at least one NFC tag when in close proximity thereto via the NFC transceiver, verify the tag data, and when the tag data is successfully verified, perform at least one device unlock operation. The controller may be further configured to determine whether the tag data should be changed based on a predetermined schedule, and if it is determined that the tag data should be changed, communicate with the at least one NFC tag to change the tag data. | 12-11-2014 |
20150371021 | AUTHENTICATION METHODS AND SYSTEMS FOR WEARABLE ELECTRONIC DEVICES - Authentication methods and systems for wearable electronic devices are provided. First, an operational state of a wearable electronic device is obtained. When the operational state is changed, an authentication process is performed, and the wearable electronic device is allowed to be accessed based on the result of the authentication process. | 12-24-2015 |
20150371022 | FUNCTION CONTROL METHODS AND SYSTEMS FOR WEARABLE ELECTRONIC DEVICES - Function control methods and systems for wearable electronic devices are provided. First, a flag having a specific initial value is provided in a wearable electronic device. Then, an operational state of the wearable electronic device is obtained. When the operational state is changed, the specific initial value of the flag is deleted or the flag is set to a specific value. Once the value of the flag does not match the specific initial value, at least one function of the wearable electronic device is disabled. | 12-24-2015 |