Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

219results about How to "Maximum safety" patented technology

System, method and apparatus for electronic ticketing

The present invention provides a system, method and apparatus for securely granting access to an event. For example, in one embodiment of the present invention, an apparatus, such as an electronic card, ticket or information carrier, contains biometric data about a user. When the “ticket” is purchased or authenticated, event access information is stored on the electronic card or ticket by an entity authorized by the event provider. The user is allowed access to the event when the biometric data stored on the electronic card or ticket matches the user's biometric data and the event access information is validated. The user's biometric data is authenticated via a biometric sensor on the electronic card or ticket. The user's biometric data can also be authenticated by the entity granting access to the event.
Owner:INNOVATION CONNECTION CORP

Trusted transactional set-top box

A set top box (STB) includes a trusted transactional cache and associated transactional protocol and enables e-commerce transactions to be securely committed to a remote server extremely quickly and with little network overhead. The invention does away with the user concern of whether the transaction was successful. The STB operates equally well on robust private networks as on unpredictable Internet or wireless networks, and avoids upsetting users who would otherwise have to wait in front of a display screen for confirmation of completion of the transaction after a temporary communication failure with the central site. The method may advantageously be used to provide cost-effective micro-payments solutions. The STB may include a dual headed display capability in which data and video maybe be directed to separate displays. The STB may feature an embedded ticket printer, as well as an embedded barcode scanner. This enables non computer literate users to more conveniently track transactions committed via the STB, or to take advantage of promotional coupons. The STB features an embedded hardware true Random Number Generator to produce maximum entropy encryption keys, therefore providing maximum secure and fool-proof means to protect private data using government authorized encryption schemes.
Owner:MUDALLA TECH INC THOITS LOVE HERSHBERGER & MCLEAN

Transdermal magnetic coupling gastric banding

InactiveUS20070213751A1Large safety marginAvoid adjustmentTubular organ implantsObesity treatmentEngineeringGastric banding
A transdermally actuated gastric banding assembly is provided which includes an adjustable gastric band, a drive assembly and a transmission assembly positioned between the driver assembly and the adjustable gastric band. The drive assembly includes an internal component configured to be mounted within the body of the patient and an external component configured to operate transdermally so as to affect movement of the internal component. At least one of the internal and external components includes a magnetized member. A proximal end of the transmission assembly is connected to the internal component. A distal end of the transmission assembly is connected to a movable portion of the adjustable gastric band. In one embodiment, the internal component is mounted for rotational movement. In a further embodiment, at least one of the internal component and external component includes a plurality of magnetized members situated asymmetrically about a circumference of the at least one internal and external component.
Owner:TYCO HEALTHCARE GRP LP

Trusted transactional set-top box

A set top box (STB) includes a trusted transactional cache and associated transactional protocol and enables e-commerce transactions to be securely committed to a remote server extremely quickly and with little network overhead. The invention does away with the user concern of whether the transaction was successful. The STB operates equally well on robust private networks as on unpredictable Internet or wireless networks, and avoids upsetting users who would otherwise have to wait in front of a display screen for confirmation of completion of the transaction after a temporary communication failure with the central site. The method may advantageously be used to provide cost-effective micro-payments solutions. The STB may include a dual headed display capability in which data and video maybe be directed to separate displays. The STB may feature an embedded ticket printer, as well as an embedded barcode scanner. This enables non computer literate users to more conveniently track transactions committed via the STB, or to take advantage of promotional coupons. The STB features an embedded hardware true Random Number Generator to produce maximum entropy encryption keys, therefore providing maximum secure and fool-proof means to protect private data using government authorized encryption schemes.
Owner:MUDALLA TECH INC THOITS LOVE HERSHBERGER & MCLEAN

Method and System for Providing Password-free, Hardware-rooted, ASIC-based Authentication of a Human to a Mobile Device using Biometrics with a Protected, Local Template to Release Trusted Credentials to Relying Parties

Biometric data, which may be suitably transformed are obtained from a biometric input device contained within a stand-alone computer or a mobile device, which may contain an ASIC chip connected to or incorporated within the stand-alone computer or mobile device and which includes the capability for capturing one or more biometric samples and for biometric feature extraction, matching and encryption. For extra security, the biometric matching is used in conjunction with a PIN to authenticate the user to the stand-alone computer or mobile device. The biometric template and other sensitive data residing on the mobile device are encrypted using hardware elements of the mobile device (or the ASIC) together with the PIN hash and/or the Password hash. An obfuscated version of the Password, stored on the ASIC or the mobile device is de-obfuscated and released to the mobile device authentication mechanism, including a Trusted Platform Module if present, in response to a successfully decrypted template and matching biometric sample and PIN. A de-obfuscated password is used to authenticate the user to the mobile device and the same or a different de-obfuscated password may be used to authenticate the user to a remote computer using the SSL/TLS or a process based upon a symmetric encryption algorithm. The locally generated password may be used to encrypt data at rest on the mobile device or ASIC and the remote authentication password may be used to encrypt data in transit to and from a remote computer. This creates a trusted relationship between the stand-alone computer or mobile device and the remote computer. The system also eliminates the need for the user to remember and enter complex passwords on the mobile device or for secure transmission of data. A similar method may be used, with the signature/sign biometric modality to determine whether the holder of an IC chip card is, in fact the card owner.
Owner:BIOCRYPT ACCESS LLC

On-type biometrics fingerprint soft keyboard

One embodiment of this invention addresses the use of biometrics for accessing a touch screen keyboard on a tablet personal computer (PC), and ensuring security if the PC is left unattended. The core idea is to assign biometrics to soft keyboards without the use of a physical keyboard. In this example, every key on the keyboard will be assigned a biometric fingerprint associated with the corresponding finger that would type it. When a user types, a portion of its fingerprint touches the keys. By storing the portions and assigning the portions to the soft keyboard, it is ensured that every key typed is associated with the corresponding key fingerprint portion, thus ensuring maximum biometric security. In addition, the keystroke delays and word delays can be recorded and compared with previous data for added security.
Owner:IBM CORP

Ergonomic swaddling garment

Ergonomic garment for swaddling an infant garment with an elongate retractable fabric shell having an outer surface and inner surface defining an interior volume for receiving the arms, legs and trunk of an infant therein. Garments have a head end for receiving the arms of said infant, a foot end for receiving the legs of said infant, and a mid section for receiving the trunk of said infant that is narrower than said head end and said foot end, and a neck opening at the head end for receiving a neck of said infant. Garments have an ergonomic peanut-like shape. Garments have a reversible closure means accessing said interior volume of said fabric shell extending longitudinally along the central axis of said fabric shell from said head end to said foot end, a chin protector closure means and optionally a means for accepting an automotive seat belt. Detachable arms and / or leggings and attached retractable arms and / or leggings garments are shown. Porous light-permeable and antimicrobial fabric embodiments are described.
Owner:BARSKI KAREN H

Secure document with self-authenticating, encryptable font

A self-authenticating encryptable font for creating secure documents. The document onto which the font is printed includes a surface containing one or more transaction fields such that transactional data from the font is printed within at least one of these fields. The font includes human-readable characters that are defined by a fill pattern made up of spaced marks and a patterned background. Security characters, made up of one or more encryptable data elements, may also be included. The encryptable data elements may be either fixed or randomly variable with regard to each human-readable character, independent of the human-readable characters, or capable of alteration by an encryption algorithm. The presence of the unique human-readable characters and the encryptable data elements give the impression that the document on which they are printed may be subject to security enhancements, while alterations to the encryptable data elements by an algorithm can be used during the printing process to incorporate additional security information into the document. A user wishing to self-authenticate encrypted information incorporated into the encryptable data elements merely passes the document through an appropriately-configured scanning device, then compares the decrypted information with overt indicia on the document.
Owner:TAYLOR COMM INC

Leg exercise machine

The invention is directed to be a hand portable exercise and training machine to improve the user's initial linear quickness and speed from a stationary or set position. The machine consists of a horizontal beam mounted above the floor with a movable foot sled, a stationary spring retainer bracket and a removable handle bar post and assembly mounted on it. Springs are attached to the front of the foot sled and the opposite end of the springs are attached to the stationary retainer bracket adjacent to the vertical handle bar post. The invention is an exercise device that applies spring resistance to the full range of motion in the user's leg as it pertains to the initial drive phase (first 3-6 steps) of a sprint. The machine can be collapsed for transport and re-assembled without the use of tools.
Owner:NOLAN GREGORY JOSEPH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products