E Rosenberg - US Patent App. 14/466,837, 2015 - Google Patents
Related US Application Data USPC.......................................................... 709/213 (63) Continuation-in-part of application No. 14/455,553,(57) ABSTRACT filed on Aug. 8, 2014 …
C Clarke, M Mullen - US Patent App. 12/795,591, 2011 - Google Patents
BACKGROUND 0002 Various encryption methodologies are used to implement the secure transfer of documents over a network Such as the Internet. Encryption is a process of …
G Leprince, B Jaslet, T Lenepveu… - US Patent App. 12 …, 2011 - Google Patents
A method and system for performing a smart repair of a target device is initiated by establishing a connection to a smart repair processing system. System components on the …
S Thom, D Thaler, T Stein - US Patent 10,546,276, 2020 - Google Patents
Primary Examiner Amare F Tabor (74) Attorney, Agent, or Firm—Holzer Patel Drennan (57) ABSTRACT The cyber owner of the asset can transfer cyber ownership to a second entity …
R Sela, A Zer - US Patent 9,075,957, 2015 - Google Patents
A third party facilitates preparation of a backup SSD for backing up a source SSD. Digital data of the source SSD, which includes protected and sensitive data and information, is …
Z Yu, W Shaoyong - US Patent 9,547,605, 2017 - Google Patents
A method for backing up data in a data center, device and system are provided. The data in all the VMs of one data center can be backed up simultaneously, and the associations …
J Zhuang, OU Shih-Mai - US Patent 11,315,122, 2022 - Google Patents
The present disclosure provides an authentication method for e-wallet carrier, wherein the e- wallet carrier is stored with an authentication program, and the method comprises: an …
E Rosenberg - US Patent App. 14/455,553, 2014 - Google Patents
BACKGROUND 0002. As time progresses, more and more people are using electronic computing devices, eg, computing systems, desk top computers, laptop computers …
S Thom, D Thaler, T Stein - US Patent 11,374,760, 2022 - Google Patents
A system manages access to an asset using a separate physical cryptographically-secure key device. A memory stores a public key as an unalterable record. An access configuration …