Matches 1 - 50 out of 343 1 2 3 4 5 6 7 >


Match Document Document Title
US20130254906 Hardware and Software Association and Authentication  
Authentication and association of hardware and software is accomplished by loading a secure code from an external memory at startup time and authenticating the program code using an authentication...
US20110258251 Portable Power Distribution  
Some embodiments provide a systems, methods, and devices for providing power to recharge portable electronic devices through a distributed network of portable power stations that provide power on...
US20110208963 SECURED KVM SYSTEM HAVING REMOTE CONTROLLER-INDICATOR  
Organizations often defend against security threats by physically isolate their internal classified networks from external networks attached to the internet. To enable easy user's access to...
US20120159650 APPARATUS AND METHOD FOR RECOGNIZING SECURITY SITUATION AND GENERATING SITUATION INFORMATION BASED ON SPATIAL LINKAGE OF PHYSICAL AND IT SECURITY  
An apparatus for recognizing security situation and generating situation information based on spatial linkage of physical and IT security, the apparatus includes: a security event collection unit...
US20140041060 Keypad Device  
An example tamper detection mechanism may include an electrical pathway having a closed conductive configuration and being openable to prevent electrical conduction along the electrical pathway,...
US20150026830 METHOD AND SYSTEM FOR LOCATING A NOTEBOOK COMPUTER  
A method for locating a notebook computer by sending a Wake on Wireless WAN (WoW) signal via a wireless network to the notebook computer to switch ON the notebook computer; instructing the...
US20140082756 SECURE PIN ENTRY DEVICE  
A secure PIN entry device including a PIN entry assembly operative to receive a PIN from a user, a PIN entry prompter operative when actuated to prompt a user to enter a PIN via the PIN entry...
US20120180140 SECURE PIN ENTRY DEVICE  
A secure PIN entry device including a PIN entry assembly operative to receive a PIN from a user, a PIN entry prompter operative when actuated to prompt a user to enter a PIN via the PIN entry...
US20130298262 System and Method for Manipulating Security of Integrated Circuit Layout  
A method for manipulating security of an integrated circuit layout, comprising: rendering a PCell that is created by an original user for a successive user; providing an open access to the PCell;...
US20130174282 DIGITAL RIGHT MANAGEMENT METHOD, APPARATUS, AND SYSTEM  
A digital right management method, including: encrypting, by a first user equipment which has access right to shared digital contents, a key of the digital contents with at least an equipment key...
US20140082690 MOBILE COMPUTING SYSTEM FOR PROVIDING HIGH-SECURITY EXECUTION ENVIRONMENT  
A mobile computing system for providing a high-security execution environment is provided. The mobile computing system separates execution environments in the same mobile device on the basis of...
US20120151607 SYSTEM FOR DETECTING INTRUSIONS BY DEVICES WITH OPENABLE CASING  
The invention comprises an intrusion-detection system based on a switch 1 that provides more effective protection by means of an innovative arrangement of three intrusion-detection contacts...
US20140007264 ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM  
A platform protected by an always-available security system, the system is described. The system, in one embodiment, comprises a near field communications (NFC) reader, a pairing logic to identify...
US20120084857 DEVICE SECURITY SYSTEM  
A computer-implemented method may include identifying a security event condition associated with a device. One or more security rules may be identified for execution based on the device and the...
US20150007275 METHOD AND SYSTEM FOR CRYPTOGRAPHICALLY ENABLING AND DISABLING LOCKOUTS FOR CRITICAL OPERATIONS IN A SMART GRID NETWORK  
A method for locking out a remote terminal unit includes: receiving a lockout request, wherein the lockout request includes at least a public key associated with a user, a user identifier, and a...
US20130160149 ENCRYPTION KEYPAD CAPABLE OF PREVENTING ILLEGAL DISASSEMBLY  
An enhanced encryption keypad (100) capable of preventing illegal disassembly for an automated teller machine comprises a key panel (101) and a main control board (102). A removal detection...
US20140223584 SMART WALLET  
A smart wallet that can only be exclusively opened by an authorized individual through biometric authentication is disclosed. The smart wallet also has a security system associated therewith to...
US20130291131 APPROACHES FOR A LOCATION AWARE CLIENT  
Techniques for securing a client. Two or more varieties of location information for a client may be received. The present location of the client is determined using the two or more varieties of...
US20130104252 TAMPER DETECTION COUNTERMEASURES TO DETER PHYSICAL ATTACK ON A SECURITY ASIC  
Various embodiments of the present invention relates generally to an integrated circuit, and more particularly, to systems, devices and methods of incorporating a tamper detection countermeasure...
US20130139272 Resource-Type Weighting of Use Rights  
Resource-type weighting is used in evaluating the use-rights associated with hardware resources.
US20080134349 CARD SLOT ANTI-TAMPER PROTECTION SYSTEM  
A secure insert comprises a shell including a lid and a container configured to receive and encase one or more circuit cards, wherein the shell is further configured to be inserted into and engage...
US20100037326 RADIATION CURABLE EMBOSSED INK SECURITY DEVICES FOR SECURITY DOCUMENTS  
A security document and a method of manufacturing a security document are provided in which a radiation curable ink is applied to at least one side of a substrate including at least one region of...
US20100306544 SECURE COMPUTING ENVIRONMENT IN A TRANSPORTABLE CONTAINER  
A secure container can comprise a security server, one or more container servers, and one or more sensors that can detect a breach of the physically secure computing environment provided by the...
US20150089674 DEVICE LOCK AND AUTOMATIC PUBLICATION IN LOST AND FOUND DATABASE  
Electronic devices are registered with a device lock service during the out of box experience. Following theft or loss of the device, an instruction can be given to remotely lock the device and at...
US20100064379 Remote Diagnosis of Unauthorized Hardware Change  
Aspects describe remotely diagnosing unauthorized hardware changes on a mobile device. The changes can be identified based on hardware component identification and/or based on behavior...
US20100083388 NETWORK PROJECTOR AND PROJECTOR SYSTEM  
The present invention aims to provide a network projector which has a simple security function via a network. The network projector comprises a power source unit which supplies power to the...
US20110154509 METHOD AND DEVICE FOR PROVIDING A SECURITY BREACH INDICATIVE AUDIO ALERT  
A device for providing a security breach indicative audio alert. The device includes: a security monitor adapted to detect a security breach in device and a loudspeaker, the device wherein...
US20070226812 Computer security switch  
A computer security device for controlling the passage of data signals to and from a computer allows the operator to control access to that computer by outside parties. The device is a switch that...
US20150186677 SERVER CHASSIS PHYSICAL SECURITY ENFORCEMENT  
Discrete-component-level physical security is provided by the physical securing of defined hardware computing components through computer-controlled processes. Physical locking mechanisms are...
US20090038019 TAMPER DETECTION MECHANISM AND CARD PROCESSING DEVICE  
A tamper detection mechanism for detecting tampering when a sub system is removed from a host device may include a screw member that may include a head portion, a major diameter shaft portion and...
US20100333215 ELECTRONIC DEVICE WITH STYLUS  
An electronic device comprising: a main body and a stylus, wherein the main body comprises: a trigger, which is assigned identification information; a socket configured for receiving the stylus,...
US20100037325 Enhanced Packaging for PC Security  
A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical...
US20120036586 Reclaim my lost computer  
If this invention is granted and allowed to be brought to market there will finally be a method by which a lost or stolen computer will have a very high degree of probability that it will be...
US20130019324 Embedded Ring Oscillator Network for Integrated Circuit Security and Threat Detection  
Aspects of the disclosure relate to combining on-chip structure with external current measurements for threat detection in an integrated circuit. This method considers Trojans' impact on...
US20090249495 QUICK-RELEASE COMPUTER ACCESS COVER  
A latch and latch handle recessed into the computer cover is provided, with the latch handle preferably presently a cam surface internally that interacts with a compatible cam surface associated...
US20140020121 ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM  
A platform including a security system is described. The security system comprises, in one embodiment, a multi-state system having a plurality of modes, available whenever the platform has a...
US20120272340 SECURING WAKEUP NETWORK EVENTS  
In an embodiment, a method is provided. The method of this embodiment provides receiving a packet having a wake-up pattern, and waking up if the wake-up pattern corresponds to one of a number of...
US20080244759 COMPUTER SYSTEM WITH ELECTRONIC LOCK AND KEYBOARD TO CONTROL THE ELECTRONIC LOCK  
An exemplary computer system includes an input device for users to input a command therein and converting the command into a coded command; a computer chassis; a computer power supply; a power...
US20130318638 Method for Programming a Mobile End Device Chip  
The invention provides a method for programming a chip for a mobile end device, wherein, in a preparatory step, a serial number is programmed into the chip and thereafter, in a programming step,...
US20130275963 SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CONDITIONALLY PREVENTING USE OF HARDWARE VIRTUALIZATION  
A system, method, and computer program product are provided for conditionally preventing use of hardware virtualization. In use, an attempt to use hardware virtualization is identified. Further,...
US20140328483 METHOD FOR PRODUCING A HARDWARE DEVICE AND HARDWARE DEVICE  
A method for producing a hardware device, in particular a trusted platform module for the execution of at least one cryptographic algorithm, the hardware device corresponding to a real-time class,...
US20090271877 METHOD TO SECURE EMBEDDED SYSTEM WITH PROGRAMMABLE LOGIC, HARDWARE AND SOFTWARE BINDING, EXECUTION MONITORING AND COUNTERACTION  
Systems and methods for securing an embedded system are disclosed. An embedded system comprises a hardware subsystem including physical components of the embedded system, a software subsystem...
US20090193527 METHOD FOR MONOTONICALLY COUNTING AND A DEVICE HAVING MONOTONIC COUNTING CAPABILITIES  
A method for monotonically counting and a device having monotonically counting capabilities. The device includes: a monotonic counter, an input interface adapted to receive requests to update a...
US20070182575 DETECTOR CIRCUIT FOR DETECTING AN EXTERNAL MANIPULATION OF AN ELECTRICAL CIRCUIT, CIRCUIT ARRANGEMENT COMPRISING A PLURALITY OF DETECTOR CIRCUITS, MEMORY DEVICE AND METHOD FOR OPERATING A DETECTOR CIRCUIT  
A detector circuit for detecting an external manipulation of an electrical circuit. The detector circuit includes a digital circuit which is sensitive to at least one of the effects of ionizing...
US20130247231 SECURE PROCESSING UNIT SYSTEMS AND METHODS  
A hardware Secure Processing Unit (SPU) is described that can perform both security functions and other information appliance functions using the same set of hardware resources. Because the...
US20130091589 MULTI-DOMAIN SECURE COMPUTER SYSTEM  
Disclosed is a hardware based secure multi-level security computing system system. The system comprises a chassis enclosing multiple separate, secure computer devices or domains, each within an...
US20120023592 MEDICAL ALERT COMPUTER INTERFACE TAMPER-PROOF SECURE DEVICE  
A medical information system includes a portable device and remote authentication computing device. The portable device stores a person's personal medical information, which it does not allow to...
US20050071670 Computer recovery or return  
A computer return apparatus includes a processor. The apparatus includes a memory connected to the processor. The apparatus includes a display. The apparatus includes a return screen that the...
US20130047272 INTEGRATED CIRCUIT FOR PREVENTING CHIP SWAPPING AND/OR DEVICE CLONING IN A HOST DEVICE  
An integrated circuit is disclosed that can be included in a host electronic device that can be commonly manufactured, where the integrated circuit can be designated (“locked”) for a specific...
US20090077675 Smart Wallet  
A smart wallet that can only be exclusively opened by an authorized individual through biometric authentication is disclosed. The smart wallet also has a security system associated therewith to...

Matches 1 - 50 out of 343 1 2 3 4 5 6 7 >