Security Patents for Sale or License
Notify me of New Entries on this Page
You can receive an email whenever a new patent is added to this category. You can unsubscribe at any time.
This innovative safety shield can be worn as a backpack and in case of explosions or shootings can be expanded to cover the whole upper body of the wearer. Made of unbreakable poly carbonate of 8mm thickness it forms a portable shelter (15kg) for aid workers and civilians, effectively protecting th...
...
Portable Security Surveillance Device (PSSD) is a multi-functional mobile assistant for supporting fundamental human values, helping us to be safe and spend our time well. Mobile connectivity reliance has become an integral part of life for many youth. PSSD’s primary focus on safety and security are...
...
It dims installation times, captures sensors and peripherals automatically, simplifies work and lowers plant costs.
The patent consists of a PCB electronic board that connects to standard anti-theft powerhouses for residential or commercial premises, simplifies and speeds up work. Converting wire...
...
- What our invention is about
GiantTrend developed a revolutionary encryption method named Data Encryption-Remapping Technology, which provides two-layer protection that first encrypts the content of data by AES-256 and then reorganizes the position of each ciphertext by user defined sequence. This...
...
It’s a method which is been used for designing passive RFID tags with multi frequencies, and multi memory. It has ability to divide the tag memory into many parts. Each part can be administrated by its one chosen frequency band.
It is an antenna with self matching impedance compatible with all comm...
...
An electronic mailbox system features: a mailbox housing with an inner cavity and slot for holding mail, a lid, an electrically-operable lock system for the lid, a mail sensor for detecting the mail being inserted into the slot, a first transmitter, a first receiver and a mailbox microprocessor; and...
...
A Silicon Valley company has developed the ultimate in online security and patented technology they call “Alive Biometric Signature Authentication Identification Security Systems Solutions™”(ABSAISSS) coupled with “Fragmented Character Data Storage Infrastructure Server Vaults™” (FCDSISS). “These Al...
...
With many systems there is a need to isolate an area or air stream in a positive and secure manner. Unfortunately even the best dampers and valves can leak and this failure can't be detected until it is too late. This patent provides an absolutely positive method of sealing contamination caused by n...
...
Geo-location and tracking by sensing the body’s heath.
The videosurveillance market is rising drastically and needs new smart sensors at a low price.
This geo-location systems qives the real-time location of individuals to Video Management Systems an to video-cameras.
The present invention relate...
...
The patent concerns a passive infrared geo-locator sensor. It detects the heath of a body ( 4 square mm of skin at 40 m are enough ) and locate it. It allows then to detect, locate and track an intruder outdoor and to position him on a digital site map and/or to drive a video camera towards the int...
...
A patent for a inexpensive in manufacturing dial padlock with almost infinite number of combinations. The attached pictures are not photos but, rather, graphic representations made by an artist....
...
US Patent 8,451,105 refers to a biometric cell phone and biometric cell phone receptor.
It is a known fact that in the transportation industry, drivers drive "over hours" to reach a facility before it closes, resulting in an overtired driver at increased risk of a highway accident, and the poss...
...
US Patent 7,414,527 refers to a Confirmation Security Pad and Weight Detection Sensor.
The primary purpose of the Confirmation Security Pad is to prevent theft and unauthorized activity.
The Confirmation Security (CS) Pad containing a weight detection sensor detects the presence and absence of...
...
Aspects of a method and system for processing video data are disclosed and may include detecting, within a single chip in a programmable surveillance video camera, one or more moving objects in a raw video signal generated by the programmable surveillance video camera. One or more characteristics of...
...
Aspects of a method and system for change detection in localization and tracking of objects in a smart video camera are provided. A programmable surveillance video camera comprises processors for detecting objects in a video signal based on an object mask. The processors may generate a textual repre...
...
A method and system for a programmable camera for a configurable security and surveillance system are provided. A programmable sensor agent for video surveillance may comprise a network interface, a processor, an image processor, and an image sensor. The image processor may comprise at least one con...
...
The present invention relates to a device for protecting and storing a security case, wherein the device (1) comprises a security shell (2) having an inside (30) and an outside (31), which security shell (2) encloses a cavity (3), which cavity (3) is arranged for containing the security case (4), wh...
...
The present invention is a spraying system that extinguishes flying embers that may land on a roof from a wild fire or forest fire. This includes a submersible pump at the bottom of a well a pool or a pond that is attached to a supply pipe that allows water to be pumped into a reservoir. Another su...
...
Our patent is an autonomous wireless alarm system that detects burglars and keeps them out of your doorstep, before they even attempt to break in or cause any kind of damage to your door or window and is activated by a non replicating remote control that has a double coding of hoping codes system.
...
...
This invention is engineered to prevent the hundreds of billions of dollars globally stolen each year by ID fraud from American consumers and taxpayers. This vast theft is enabled by industry's and government's imposed use of archaic identification cards for financial transactions. These include sta...
...
The device (1) has an information processing unit (6) for differentiation of static objects i.e. obstacles (7), and objects and persons to be moved. The objects and persons advance a vehicle with a display unit (8) for an alert before a collision with the static object or the objects and persons to ...
...
The invention provides a method and mobile phone of identifying at least one of a security or emergency critical situation of a user of a mobile phone, the mobile phone comprising at least one acceleration sensor, the method comprising the steps of: obtaining at least one acceleration signal from sa...
...
A system for security purposes comprising: - an inner structure that is accessible by a plurality of terminals, - wherein the system allows a measurement on the inner structure of the system by using a challenge signal comprising a plurality of input signals applied in parallel to the terminals and ...
...
A method for security purposes is disclosed, in which a challenge signal is applied to a physical object and a response signal is received from the physical object. The response signal comprises a plurality of characteristic resonant optical mode or a characteristic of the response signal is determi...
...
A millimeter wave detection apparatus includes optical devices (30, 50, 60), used to receive the millimeter wave radiating from the detected object, and gather the received millimeter wave; a radiometer receiving device (80), used to receive the energy of the gathered millimeter wave, and transform ...
...
A system for executing a cyber investigation by a non-expert user, including a computer having a processor, a memory, and a display; a computer-readable medium having stored thereon instructions for execution of a wizard application, the processor adapted to execute the instructions when the compute...
...
Methods and systems are provided for thwarting semi-invasive and non-invasive security attacks on an integrated circuit. The methods and systems generally make reverse engineering, reconfiguration, decryption, observation, or any combination thereof, of the internal operations of the integrated circ...
...
A video surveillance system includes a plurality of video sources, at least one processing server in communication with the video sources, and at least one monitoring station viewing video from the video sources. The video sources are distributed over a target area to be monitored by the surveillanc...
...
A bundle of drawn fibers that have X-ray scintillating unagglommerated nanocrystallite particles in plastic or glass cores of down to 0.1 micron spacing and claddings of X-ray absorbing compounds in the cladding composition. Optional is a cover to the bundle that blocks light from leaving the bundle...
...
The present invention provides systems and methods for utilizing zero-power, energy-harvesting computational modules to provide secure and reprogrammable wireless communications with vulnerable devices comprising integrated circuits (ICs), including active implantable medical devices, electronic loc...
...
The present invention provides systems and methods for securing communications in a wireless network by utilizing the inherent randomness of propagation errors to enable legitimate users to dynamically create a shared symmetric secret key. In one embodiment, the invention provides a system with two ...
...
The present invention relates to a Visual Background Extractor ( VIBE ) consisting in a method for detecting a background in an image selected from a plurality of related images. Each one of said set of images is formed by a set of pixels, and captured by an imaging device. This background detection...
...
The present invention relates to a method for the manipulation for an identification purpose of a microcarrier comprising the steps of: (a) an identification purpose step of the microcarrier; and (b) a positioning and orientation step prior to or during the identification purpose step, wherein the i...
...
The present invention relates generally to a method for determining the level of expression of one or more candidate objects of interest in a biological sample. In particular, the present invention relates to a method for determining the level of expression of one or more candidate objects of intere...
...
Systems and methods of providing opportunistic security for physical communication channels are disclosed. One disclosed method is for opportunistic secure communication on a main channel between a sender device and a receiver device when an eavesdropper device is listening on an eavesdropper channe...
...
A method is provided for provisioning a device certificate on a device. The device is configured to communicate wirelessly with a plurality of backend servers via a communication network. The communication network includes a mobile data server. An activation request is initiated to the mobile data s...
...
A security system (SYS) is proposed for a sales device, comprising at least one first device (CP) for generating a payment receipt for purchased goods and/or services, and comprising at least one second device (CTR) for examining the payment receipt, wherein the first device (CP) generates an electr...
...
These 2 applications include a new and improved watermarking system and method for use with video and audio. The system and method can be applied directly to compressed media data/ frames with variable lengths (as opposed to a common fixed length) which (1)tremendously reduces the amount data needed...
...
Background
Researchers at the University of Toronto have developed a novel materials platform based on self-assembling spherical polymer particles which can store a variety of additives such as fluorescent dyes in either the spherical cores or the surrounding polymer matrix.
Technology
It h...
...
Security evaluations for software systems can be time consuming and expensive endeavors. In particular, the tracing of security requirements into code and the accurate maintenance of that mapping as a system evolves over time can be tedious and error-prone. Currently evaluators must maintain a mappi...
...
Biometrics use biological features such as fingerprints to determine an individual’s identity by comparing the observed fingertip patterns to a previously stored pattern. Biometrics are useful for controlling access to devices - such as laptops - or to facilities. One drawback, however, is the user-...
...
video does not fully support precision engagements due to poor geolocation of targets in video. A technique for improved image coordinate to ground position transformation is needed for real time, integrated tracking for situational awareness; force protection; and forensic analysis of the battlefie...
...
Recent history demonstrates that weapons of mass destruction can be built and deployed by almost any individual or group that has an intent to cause harm or that is looking for media attention for its cause. The arsenal of weapons available to the terrorist includes chemical and biological agents. T...
...
Personnel operating check points, border crossings, toll barriers, parking garages, traffic stops and others are subject to many different types of hazards. They include explosives, drugs, weapons, chemical, biological and radiological agents, smugglers, contraband and others. A method is needed to ...
...
Detection of underwater metal objects is used in a wide variety of areas: commercial salvage operations, treasure hunting, law enforcement, minesweeping and underwater-unexploded ordnance (UXO) remediation. The Tow Body Metal Detector (TMBD) is connected to a tow vessel via a cable and tow point. Th...
...
Signaling for near term and near by assistance when a vessel is sinking generally requires human intervention. This is in the form of radioing a "Mayday" or setting off signal flares. Sometimes access to these emergence devices is not practical.
The Automatic Integrated Distress Device(AIDD), in...
...
Portable system for forensic analysis to rapidly detect and locate latent fingerprints in a nondestructive manner. No system exists that detects and locates the presence of a latent print and provides information on the quality metric of the print itself. Current systems are seriously inefficient, e...
...
There exists a need for metal detection systems for screening people for metal weapons such as guns and knives. Conventional metal detectors require people to walk through a small portal that has an electromagnetic induction (EMI) metal detector. Typically, only one person can walk through a metal d...
...
There exists a need for metal detection systems for screening people for metal weapons such as guns and knives. Conventional metal detectors require people to walk through a small portal that has an electromagnetic induction (EMI) metal detector. Typically, only one person can walk through a metal d...
...
Aggressive Homeland Defense initiatives may force foreign or domestic terrorists to construct explosive devices from commercial sources such as ammonium nitrate fuel oil (ANFO). As seen in the case of the Oklahoma City bombing, such low technology munitions have the potential for inflicting severe d...
...
The current global climate necessitates protection against attacks from anti-aircraft assaults for both military and civilian aircraft. Many of the currently available counter measure systems work by using an Infrared Counter Measure (IRCM) approach however, the deployment of an IRCM system is prohi...
...
Current security scanning procedures at commercial airlines may reasonably fail to detect nonmetallic objects (i.e., plastic explosives such as C4 and ceramic devices) concealed under a person's clothing. Passive infrared receivers that measure thermal emissions have proven to be ineffective due to ...
...
Several million cargo containers arrive into the U.S. every year bringing a large variety of goods into the country. Recent concerns over the possibility of radioactive materials used in the making of a "dirty bomb" being smuggled into the country by terrorists has heightened the need for screening ...
...
Violence and criminal activity involving firearms is a significant problem for most metropolitan areas in the United States, and numerous suburban areas as well. Two of the problems facing law enforcement authorities when handling these types of crimes are (1) the speed at which the violence begins ...
...
With the recent terrorist attacks, providing a safe environment in large settings such as stadiums, amusement parks, airports and other areas where large groups of people are moving through has taken on renewed importance. Currently, perhaps the most effective portal that has an electromagnetic indu...
...
The present invention provides for a method and apparatus for detecting the position, intensity, and initiation time of an energy pulse in 3-D space. The method and apparatus may detect signals at very high speeds and may employ commercial-off-the-shelf (COTS) components that are inexpensive and dur...
...
With an estimated 100 million mines and countless millions of acres of land contaminated with unexploded ordnance (UXO) worldwide there is a need for sensor systems and methods that can detect and identify large and small explosive objects buried in soil. In addition, during armed conflict, there is...
...
With an estimated 100 million mines and countless millions of acres of land contaminated with unexploded ordnance (UXO) world-wide there is a need for a sensor system and methods that can detect and identify large and small metal objects buried in the soil. In addition, during armed conflict, there ...
...
With the recent actions of individuals, both in the private sector and in the schools, providing a safe workplace, place of learning or airflight has taken on renewed importance. Currently, perhaps the most effective methodology for detecting explosives is highly trained K-9's, who are typically tra...
...
Narcotics traffic throughout the world is a serious problem. Even though current interdiction methods has improved, it is certain that only a small percentage of drugs entering the United States are confiscated. One reason for the low rate of drug interdiction is the lack of adequate instrumentation...
...
There is typically an abundant sample available for analysis in TOF and other mass spectrometers located in a laboratory. Thus, a highly resolved spectrum may be achieved by repeated ionization and detection of the analyte. By contrast, in the field, only a small and diffuse sample may be available ...
...
Small devices that can rapidly and accurately analyze chemical and biological molecules are required by many industries. Homeland security and the medical community lead the list. Current instruments are either too large to be used as a first responder in the field, too slow in giving results to ana...
...
Small devices that can rapidly and accurately analyze chemical and biological molecules are required by many industries. Homeland security and the medical community lead the list. Current instruments are either too large to be used as a first responder in the field, too slow in giving results to ana...
...
Abstract:
Researchers at NASA Marshall Space Flight Center (MSFC) have developed a series of technologies for marking and detecting images of two-dimensional matrix symbol patterns used to identify and track manufactured items. These matrix symbols can be hidden from view (e.g., beneath coatings or...
...
FORENSIC DNA TRACE FOR THE HOME
StranDNA (UK) Limited is a new company with offices in Guildford, Surrey, United Kingdom who are offering Sales, Installation & Data Basing regarding a totally new and innovative access control system given the name “Chain Reaction” this unique security product pla...
...
Introduction Immunoassays remain the most versatile and rapid method for the detection of chemical and biological warfare (CBW) threat agents. Current requirements from our military and government is to be able to deploy a field hardened and easily mobile device. Historically this has led to serious...
...
Introduction One of the problems with producing a small field usable microfluidic device is the requirement to have some form of power to make it work. More and more devices currently being developed will either require the system to work with a minimal power supply or none at all. Technology descri...
...
Signed up for selling some patents at your market place last week. Yesterday I recceived a contact from a serious and relevant company. Really impressed, thanks for a great service!
– Cristina C.