System and method for item self-assessment as being extant or displaced
SC Oppenheimer - US Patent 9,224,096, 2015 - Google Patents
G06F11/3409—Recording or statistical evaluation of computer activity, eg of down time, of
input/output operation; Recording or statistical evaluation of user activity, eg usability …
input/output operation; Recording or statistical evaluation of user activity, eg usability …
System and method for preventing access to data on a compromised remote device
DJ Mendez, M Ng - US Patent 8,012,219, 2011 - Google Patents
US8012219B2 - System and method for preventing access to data on a compromised remote
device - Google Patents US8012219B2 - System and method for preventing access to data …
device - Google Patents US8012219B2 - System and method for preventing access to data …
System and method for secure relayed communications from an implantable medical device
A Poltorak - US Patent 9,215,075, 2015 - Google Patents
6,868.447 6,879,574 6,885.388 6,886,095 6,898.445 6,898,618 6,908,391 6,912,657
6,916,247 6,917,976 6,918,084 6,922,725 6,925,562 6,945,870 6,947,995 6,948,066 …
6,916,247 6,917,976 6,918,084 6,922,725 6,925,562 6,945,870 6,947,995 6,948,066 …
Supervision of high value assets
SJ Winick - US Patent 7,651,530, 2010 - Google Patents
(58) Field of Classification Search.................... 726/35 Electronic devices in a local area
network (LAN), eg, a DVD See application file for complete search history. video recorder …
network (LAN), eg, a DVD See application file for complete search history. video recorder …
System and method for preventing access to data on a compromised remote device
DJ Mendez, M Ng - US Patent 8,696,765, 2014 - Google Patents
2002/0098840 A1 7/2002 Hanson et al. US PATENT DOCUMENTS 2002.0128. 972 A1 9,
2002 Stefik et al. 2002/0133465 A1 9, 2002 Stefik et al. 5,631,947 A 5, 1997 Wittstein et al …
2002 Stefik et al. 2002/0133465 A1 9, 2002 Stefik et al. 5,631,947 A 5, 1997 Wittstein et al …
System and method for enhancing security of an electronic device
DN Hall, C Lee, SAS Coggins… - US Patent App. 11 …, 2008 - Google Patents
According to one embodiment of the invention, a method comprises detecting an event that
suggests unauthorized access to a subscriber device. After such detection, an activity or …
suggests unauthorized access to a subscriber device. After such detection, an activity or …
System and method for facilitating a wireless financial transaction
DM Mylet, LM Amaitis, AB Wilkins - US Patent 8,086,519, 2011 - Google Patents
K. Cavanaugh,“You can take it with you Ywireless trading service.” NDN-174-0616-70 17-3,
ISSN-1060-989X, 1 pg. 1999. MN Duffy,“The market moves do you?” NDN-174-0601-5281 …
ISSN-1060-989X, 1 pg. 1999. MN Duffy,“The market moves do you?” NDN-174-0601-5281 …
Method for determining identification of an electronic device
PB Gardner, V Volodarets - US Patent 9,547,780, 2017 - Google Patents
US9547780B2 - Method for determining identification of an electronic device - Google Patents
US9547780B2 - Method for determining identification of an electronic device - Google Patents …
US9547780B2 - Method for determining identification of an electronic device - Google Patents …
Defense mechanism for server farm
PT Baffes, JM Garrison, M Gilfix, A Hsu… - US Patent …, 2009 - Google Patents
A method and system for handling a malicious intrusion to a machine in a networked group
of computers. The malicious intrusion is an unauthorized access to the machine, such as a …
of computers. The malicious intrusion is an unauthorized access to the machine, such as a …
Security module having a secondary agent in coordination with a host agent
WD Gordon - US Patent 7,818,803, 2010 - Google Patents
The invention is directed to a security module deployed in a host device, which provides a
secondary agent that operates in coordination with the host agent in the host device, but …
secondary agent that operates in coordination with the host agent in the host device, but …