Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

270 results about "Mobile security" patented technology

Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms

A method, apparatus, computer readable medium, computer system, wireless or wired network, or system to provide an online and / or mobile security of a user's privacy and / or security method of internet or mobile access or system, apparatus, computer readable medium, or system using encryption technologies and / or filters to access data, encrypt and / or decrypt data, sync data, secure data storage and / or process data using cloud technology across many different networks and / or fiber optic communications from an endpoint accessed through multiple devices, browsers, operating systems, networks, servers, storage, software, applications or services integrated in a public cloud or a private cloud within an enterprise, a social network, big data analytics or electronic surveillance tracking or some mashup of two or more to prevent the unauthorized collecting, tracking and / or analysis of a user's personal data by a third party and / or for generating relevant advertising, mobile, internet social messaging, internet posted promotions or offers for products and / or services.
Owner:HEATH STEPHAN

Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms

A method, apparatus, computer readable medium, computer system, wireless or wired network, or system to provide an online and / or mobile security of a user's privacy and / or security method of internet or mobile access or system, apparatus, computer readable medium, or system using encryption technologies and / or filters to access data, encrypt and / or decrypt data, sync data, secure data storage and / or process data using cloud technology across many different networks and / or fiber optic communications from an endpoint accessed through multiple devices, browsers, operating systems, networks, servers, storage, software, applications or services integrated in a public cloud or a private cloud within an enterprise, a social network, big data analytics or electronic surveillance tracking or some mashup of two or more to prevent the unauthorized collecting, tracking and / or analysis of a user's personal data by a third party and / or for generating relevant advertising, mobile, internet social messaging, internet posted promotions or offers for products and / or services.
Owner:HEATH STEPHAN

Counterfeit proof labels having an optically concealed progressive shifting security safety symbol for quick visual identification utilizing a mobile phone for online verification

The prevention of counterfeiting labels for various products is addressed by introducing counterfeit proof labels having an optically concealed, invisible progressive shifting security safety symbols for quick identification. The label is printed on a high-resolution micro-optic photo chromogenic material. A multiple number of images of an optically compressed security safety symbol are printed on the focal plane along the linear optical center of each micro-lenticule across the entire area or a small portion of the label. Due to the optical effect of the micro-optic, the complete security safety symbol is not clearly visible at normal viewing distance. When viewing the label directly or using the camera of a mobile phone at a close-up distance or slightly bending the label, each micro-lenticule within the viewing angle projects and magnifies a small section of the compressed security safety symbol on the surface of the micro-lenticules to reassemble the complete original image of the security safety symbol for identification.The image elements that compose the compressed security safety symbols under each micro-lenticules are printed at the approximately same location on the focal plane of each micro-lenticule in relation to the linear optical center of the micro-lenticule. Therefore the same and complete reassembled image of the security safety symbol can be seen from any location of the label for quick identification. The complete reassembled image of the security safety symbol is progressive shifting following a moving viewpoint for quick and accurate identification.The color photo of the reassembled security safety symbol can be sent by a mobile phone installed with a related software to an Anti-Counterfeiting Control Center for computer matching and verification and the consumer will be advised of the result in a matter of seconds
Owner:LO ALLEN K

Mobile Security Monitoring Method and System and an Alarm Security Node In the System

InactiveUS20090231122A1Ease in possibilityMinimized cost levelTelephonic communicationElectric testing/monitoringVideo monitoringUser device
A mobile security monitoring method and system and an alarm security node in the system for intelligent security system, where said intelligent security system is activated by a breach in a security zone. This breach will start a video monitoring/recording sequence that is sent out via the broadband to an alarm center. The alarm center forwards this alarm information to a user as SMS/MMS information through a mobile network. The user can view and evaluate what is going on at the security zone and can decide what action to initiate. This will minimize a false alarm generation and thus cut down the costs of follow thru of the false alarm (s) by i.e. an alarm security provider. For security and cost reason, the intelligent security system is the only client of the server-side alarm center. The concept is to use existing IT infrastructure at the security zone for user like W-LAN, broadband, GPRS and mobile devices. A mobile phone can be used for activation and deactivation of intelligent security system based on manual push of a button on the user device. Another aspect is to make the activation/deactivation step dependent on mobile location like GPS or mobile positioning system based on mobile network 400 infrastructures that use the spatial trigger.
Owner:OPTIS WIRELESS TECH LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products