Matches 1 - 50 out of 335 1 2 3 4 5 6 7 >


Match Document Document Title
US20130187752 Coded Doorbell Chime  
A coded doorbell chime and a system therefore that is useful for effectively screening visitors at an entrance into the structure by providing one or more different doorbell sounds for different...
US20110050388 Gesture Based Electronic Latch for Laptop Computers  
A portable information handling system includes a top cover, a base, and an electronic latch. The top cover is connected to the base. The top cover has a gesture sensitive surface configured to...
US20120169459 SYSTEM AND METHOD FOR PASSIVELY ACQUIRING EXISTING CUSTOMERS' MOBILE PHONE NUMBERS FROM CUSTOMER SERVICE LOGS  
An entity passively acquires an existing customer's mobile phone number and links the customer's mobile phone number to the customer's account without requesting the customer to actively provide...
US20110304425 Systems and Methods for Efficient Authentication  
A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module...
US20110241824 IN-VEHICLE MOUNT TYPE BATTERY CHARGING SYSTEM, MANAGING SERVER, MANAGING SERVER CONTROL METHOD AND COMPUTER-READABLE MEDIUM STORING PROGRAM FOR MANAGING SERVER  
An in-vehicle mount type battery charging system including a charging station having a charger for charging an in-vehicle mount battery of an electric vehicle, and a managing server connected to...
US20120029312 SYSTEM AND METHOD FOR LOCATION TRACKING OF PATIENTS IN A VITAL-SIGNS MONITOR SYSTEM  
Systems and methods of tracking a patient within a facility via a vital-signs patch attached to the patient are disclosed. A first signal is received from a bridge, the first signal comprising...
US20120188053 System and method for monitoring patients that perform a medical self-check  
A system for monitoring patients that perform a medical self-check includes a piece of equipment having a data entry unit, through which a user can enter one or more data; a user identification...
US20110270480 BATTERY MODULE, ELECTRIC VEHICLE, AUTHENTICATION APPARATUS, AND DISCHARGING CONTROL METHOD FOR BATTERY MODULE  
There is provided a battery module including: a power storage unit storing power; a first authentication unit carrying out first authentication via a first authentication route; a second...
US20120203573 METHODS, SYSTEMS, AND APPARATUS FOR OPTIMIZING EFFECTS OF TREATMENT WITH MEDICATION USING MEDICATION COMPLIANCE PATTERNS  
Methods, systems, and apparatus monitor medication usage data for one patient or a population of patients, which can be processed to determine compliance patterns. Such methods and systems can...
US20140292477 SYSTEM AND METHOD FOR IDENTIFICATION AND AUTHENTICATION OF PRECIOUS METALS AND SMALL JEWELRY ITEMS USING RADIO FREQUENCY IDENTIFICATION ("RFID") TECHNOLOGY  
A system and method is provided for the identification and authentication of precious metals and small jewelry. The system can include an embedded RFID tag, RFID tag reader and reader based unit...
US20130307667 AUTHENTICATION SYSTEM OF PORTABLE ELECTRONIC DEVICE AND PORTABLE ELECTRONIC DEVICE USING THE SAME  
An authentication system of a portable electronic device is disclosed. The authentication system of a portable electronic device includes a first identity recognition module, a second identity...
US20120212321 SYSTEM AND METHOD FOR MANAGING ACCESS TO AND TRACKING A PLURALITY OF CARTS  
A system and method for managing access to a plurality of carts. A plurality of users may be created in a database, each user having unique identifying information. Users may be grouped into user...
US20120274442 METHOD AND SYSTEM FOR MEASURING THE MOBILITY OF AN ANIMAL  
A method and system to measure and record the mobility score of quadrupeds is disclosed. The method and system determines when an animal is walking and measures dynamic parameters to assess gait...
US20100231352 ACCESSORY IDENTIFICATION FOR MOBILE COMPUTING DEVICES  
Embodiments disclosed herein provide for identification processes and/or procedures for accessories coupled with a mobile computing device. During identification an accessory can communicate lingo...
US20060165260 Product authenticity validation system  
A method, system and apparatus for verifying the authenticity of a product are described. A verification center is maintained which can communication with a database. A verification card is...
US20150002260 SYSTEM AND METHOD FOR AUTHENTICATING RFID TAGS  
A system and method of providing authenticity to a radio frequency identification (RFID) tag are provided. The method comprises generating a plurality of digital signatures, wherein each digital...
US20110140836 COMMUNICATION PAD FOR A COMMUNICATION TERMINAL  
A communication pad for communication with a communication terminal is provided, wherein the communication pad comprises a processing unit and a non-volatile memory having a crypto key and/or a...
US20050068152 Writer, reader, and examining method  
An examining method is provided to expedite customs clearance procedures including authenticity verification of brand-name products. A writing apparatus of a company manufacturing or selling...
US20140009259 SEA-BASED SECURITY ARCH FOR IDENTIFYING SHIPPING CONTRABAND  
The invention discloses devices and methods for analyzing inbound and outbound ships for illegal or dangerous cargo or persons. An arch is generally placed several kilometers from shore, the arch...
US20050018237 Digital transmitter security  
A digital transmitter detects a security code and determines whether a user of the digital transmitter has proper security authorization. The digital transmitter sends data corresponding to...
US20110140840 User personalization with bezel-displayed identification  
An identity of a person proximate to a display device is determined by an identity profile controller. The identity profile controller determines whether a configured viewing profile exists for...
US20140159860 Gas Activated Changes to Light Absorption and Emission Characteristics for Security Articles  
Disclosed are security articles and methods and systems for authenticating security articles using a plurality of stimuli. According to one embodiment, an illustrative security feature includes an...
US20120268238 APPARATUS AND SYSTEM FOR PROVIDING WIRELESS CHARGING SERVICE  
A wireless charging apparatus and system according to an embodiment of the present invention provides a wireless charging service through authentication so as to efficiently control charging...
US20150161883 REMOTE CONTROL OF A DEVICE VIA TEXT MESSAGE  
A device is configured to receive a text message sent by a user device to a centralized address. The text message includes text describing a command to be executed by a client device. The device...
US20120066158 THEFT PROTECTION DURING THE SECURITY CHECK OF CARRY-ON LUGGAGE  
A method relates to theft protection during a security check of carry-on luggage and/or other personal objects in passenger terminals of airports or the like. Objects are placed by the passenger...
US20130222109 System-Level Chip Identify Verification (Locking) Method with Authentication Chip  
A system for authenticating electronic devices, particularly chips or integrated circuits is described. This allows authenticating that the devices are authorized by the original manufacturer for...
US20130342311 PRODUCTION METHOD, RFID TRANSPONDER, AUTHENTICATION METHOD, READER DEVICE AND COMPUTER PROGRAM PRODUCT  
The exemplary embodiments of the invention realize an efficient prevention of massive infiltration of cloned RFID transponders into existing and new RFID systems. Furthermore, reader devices used...
US20120319816 PATIENT MONITOR CAPABLE OF MONITORING THE QUALITY OF ATTACHED PROBES AND ACCESSORIES  
A system and method to help maintain quality control and reduce cannibalization of accessories and attached probes in a highly sensitive patient monitor, such as a pulse oximetry system. One or...
US20120256723 RANDOM LOCATION AUTHENTICATION  
An authentication string, such as a password, consists of characters. Each of the characters in the authentication string is randomly associated with a defined location on a device. For example,...
US20140368312 Authentication method between a reader and a radio tag  
A method for authenticating a reader to a radio tag includes the following steps, which are implemented by the tag: receiving a piece of information ciphered by a reversible operation, which is...
US20140306799 Vehicle Intruder Alert Detection and Indication  
Methods and systems for a detecting an intruder near or within a vehicle are disclosed. Specifically, a method to detect and identify a person near or within a vehicle as an authorized or an...
US20060022792 Method of performing an automobile transaction where an owner permits a user to use an automobile without regard for the creditworthiness of the user  
A method of performing an automobile transaction where an owner permits a user to use an automobile without regard for the creditworthiness of the user. The method includes the step of providing...
US20100033572 Ticket-holder security checkpoint system for deterring terrorist attacks  
A security checkpoint system and apparatus that provides security officers entrusted with protecting our nations' critical infrastructure or other high risk locations, a means of isolating and...
US20110197075 ELECTRONIC DEVICE AND POWER ADAPTER THEREOF AND METHOD FOR IDENTIFYING POWER ADAPTER  
An electronic device includes a detection module, an identification code generation module, a decryption module, a comparison module, and a control module. The detection module transmits a...
US20100303230 Secure Identity Binding (SIB)  
A system includes a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and a device to be identified by the tag, in which: the device is configured to...
US20110261202 Method and System for an Integrated Safe City Environment including E-City Support  
Described are use of clustered intelligent method of using video analytics, event driven systems and policy management for integrated approach to implement safe environment, such as a “Safe City”...
US20110154229 MOSAIC IDENTITY  
Techniques are disclosed herein for adapting user interaction with resources to facets of the user's identity. A user has multiple facets of their identity such as parent, employee, gamer and...
US20120154111 METHOD FOR INSPECTING A PRODUCT AS AN ORIGINAL PRODUCT OF A PRODUCT PRODUCER  
Against the background of continually growing problems of product piracy, in particular due to the further expansion and liberalization of international trade, there is great demand for automated...
US20070262154 Secure product authentication tags  
A tag with features to enable its authenticity to be determined includes a hidden code intermixed with a visible pattern such that the hidden code is not readily detectable under ambient light...
US20070291988 METHOD AND DEVICE FOR PROTECTING PRODUCTS AGAINST COUNTERFEITING  
A method for protecting commercial goods against counterfeiting by detecting counterfeited goods that can be used by manufacturers for protection of their products and for protecting consumers...
US20120200386 METHOD OF MUTUALLY AUTHENTICATING A READER AND A RADIO TAG  
A method and apparatus are provided for mutually authenticating a reader and a radio tag. The method includes: a step of the tag sending data to the reader, the data enabling an index to be...
US20060202795 Method for the production of a book cover insert and book-type security document and book cover insert and book-type security document  
The invention relates to a method for the production of a book cover insert (11) and to a method for the production of a book-type security document (30) and also to a book cover insert and a...
US20140132390 INTELLIGENT LIGHTING NETWORK FOR GENERATING LIGHT AVATARS  
Disclosed is an intelligent lighting network for facilitating operation of a lighting system including at least one controllable light source and configured to generate light representing light...
US20110133883 ANONYMOUS AUTHENTICATION METHOD BASED ON PRE-SHARED CIPHER KEY, READER-WRITER, ELECTRONIC TAG AND SYSTEM THEREOF  
An anonymous authentication method based on a pre-shared key, a reader-writer, an electronic tag and an anonymous bidirectional authentication system are disclosed. The method comprises the...
US20070241860 Quality assurance system and quality assurance method  
A managing unit manages an identifier for identifying an authenticated container that is authenticated as a legitimate container. An inquiring unit inquires, before transferring a substance...
US20100052845 Antitheft System For Vehicle  
In a keyless entry system, a CPU in an ECU and a CPU in a remote control key change a function formula specified by primary function formula data stored in a memory and a function formula...
US20120218073 Accessible Region of a Device  
A device to detect a portable device associated with a user accessing an accessible region of the device with a sensor, identify the portable device and log the user into the device with a profile...
US20080024269 Authenticity determination system of responder, identification system, and interrogation unit  
A responder authenticity determination system, comprising: a responder that sends a response signal in response to a received signal; an interrogation signal generator that generates an...
US20100052881 EMERGENCY STARTING SYSTEM OF VEHICLE AND METHOD THEREOF  
The present invention relates to a button starting system for a vehicle which is able to stably start up by using an LF antenna installed in the vehicle in an emergency of a smart key. According...
US20110193677 BASE STATION, SENSOR NETWORK SYSTEM INCLUDING THE SAME, AND METHOD OF DETERMINING SECURITY THRESHOLD FOR SENSOR NETWORK SYSTEM  
The present invention relates to a base station, a sensor network system including the base station, and a method of determining a security threshold for the sensor network system. In the method...

Matches 1 - 50 out of 335 1 2 3 4 5 6 7 >