SEARCH
Tynax ~ Patent Library

Information Security : Data Security

Sign up for an email alert when new listing are posted, or subscribe to our RSS feed.

Can’t find what you are looking for?  Create your own topic - register for a Tynax Account, and Create a Saved Search.

Patents & Technology Available

Number of Technology Available listing in this topic: 469

Data Cloud Portfolio
Secure user workflow environment providing product for e.g. Internet  > view
CyberSecurity Portfolio
Cybersecurity focuses on protecting networks, computers programs, and data from unauthorized access or breaches  > view
Security Management Portfolio
Security protection apparatus and method for endpoint computing systems  > view
Physical Retail In-Store Behavior Sensing and Analytic Technology
Patents cover video analytics, mobile tracking, multimodal fusion, machine learning, and shopper science technology.  > view
Disruptive IoT/IoE/M2M Patents and Fully-Developed, Post-Pilot, Related Technology Transfer based upon the Patents
Patents in the wireless sensor Internet of Things (IoT)/Machine to Machine (M2M) and fully-developed Enterprise SaaS-PaaS IoT Technology Transfer Solution  > view
Smartphone data backup and restoration system
Establishes bi-directional communication between smartphone and system device and sending data through backup and restoration  > view
Protection against Phishing Attacks; Organizing Playlists for Digital Media
This portfolio centers around: (i) Protection against phishing attacks, and (ii) Organizing playlists for digital media based on user-defined “tags” that group together ...  > view
Secure Storage, Retrieval and Authorization of Biometric Information.
A secure biometric based identification and authorization system for a collected physical biometric for a security infrastructure.  > view
Flash Memory Portfolio
Priority Dates Back to 2002  > view
Mobile Communicator Device Including User Attentiveness Detector
A mobile communicator with a speed detection system. Includes a user attentiveness detector to determine whether a user is inattentive and a sensor ...  > view
Tamper-Proof Video Security System
A de-centralized system for storing replicated security video footage on plurality of cameras, protective footage from deliberate or accidental destruction  > view
Powerful Ultrafast and Robust Control Algorithm
This algorithm simultaneously optimizes the time and frequency response of feedback control systems.  > view
Mobile Portfolio - Geolocation
Geolocation solutions for calculating distances between wireless nodes, including the RTT between a node to be positioned and a reference node.  > view
Scalable Video Coding Method
Method of scalable video coding where the video signal coded at various layers of spatial resolution, by means of a prediction mechanism between ...  > view
Mobile / Cloud / GUI / Media Streaming Portfolio
Unencumbered Portfolio with Extensive Package of EOU  > view
Captcha Technology Using a Puzzle
Puzzle Captcha is more secure, easier and faster to complete than commonly used text based captcha methods.  > view
Plug-in Wireless Communication Dongles, Cards & Modules and the Devices that use them
For Mobile handsets / smartphones / tablets, Laptops, Cameras, Printers, Routers, Game Consoles, etc.  > view
Digital Rights Management
International Patent Portfolio Securing Digital Content on Smartphones and other Devices  > view