FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page



Stealth network node
A method, a network node, and a set of instructions are disclosed. A network interface may have a precedent network address to represent the network node in the network . A processor may recognize an address hop trigger. The processor may change to a successor network address...

Stealth tracking device
A device to track and to provide positioning information for goods susceptible to be stolen, such as objects of value and vehicles, based on a undetectable module which can be activated by a motion-sensor, thereby allowing the disappeared goods to be located instantaneously and inconspicuously and, unperceived by the thief, transmitting...

Software self-checking systems and methods
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that...

Ammunition delivery system arrowhead and method of use
A device and method introduces the use of conventional ammunitions to the archery/bow hunting industry. The device achieves stealthy delivery of firearm munitions and increases the firepower of standard arrows resulting in deeper penetration into a target. The device consists generally of a containment housing threaded internally on one end for...

Carbon nanotube coatings for visible and ir camouflage
The present invention provides carbon nanotube coated fabric compositions for the purpose tuning the optical properties of fabric, in particular the optical transmittance, absorption, and reflectance in the visible, NIR and mid-IR ranges. The carbon nanotube coated fabrics of the present invention exhibit relatively uniform absorptivity and reflectivity of light across...

Stealth mode for interacting with electronic messages
A stealth mode may be used to interact with electronic messages. A user may enter the stealth mode to interact with electronic messages without making state changes to the messages. While operating in stealth mode, operations (e.g. implicit operations such as reading a message) do not change the state of the...

Wireless communication method and system for transmission authentication at the physical layer
The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal)....

Network defense system and framework for detecting and geolocating botnet cyber attacks
A network defense system is described that provides network sensor infrastructure and a framework for managing and executing advanced cyber security algorithms specialized for detecting highly-distributed, stealth network attacks. In one example, a system includes a data collection and storage subsystem that provides a central repository to store network traffic data...

Ammunition delivery system arrowhead and method of use
A device and method introduces the use of conventional ammunitions to the archery/bow hunting industry. The device achieves stealthy delivery of firearm munitions and increases the firepower of standard arrows resulting in deeper penetration into a target. The device consists generally of a cylindrical housing threaded internally on one end for...

Method for improving ground travel capability and enhancing stealth in unmanned aerial vehicles
A method for improving ground movement capability and enhancing stealth in unmanned aerial vehicles is provided. The present method comprises providing, in an unmanned aerial vehicle equipped with wheels, one or more onboard drive means capable of translating torque through the vehicle wheels and controllable to move the unmanned aerial vehicle...

Stealth network attack monitoring
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for stealth attack monitoring. In one aspect, a method includes monitoring a network for failed connection attempts in the network, wherein each failed internal connection attempt is initiated by a source asset and is an attempt to connect...

System, method, and device for intelligence gathering and position tracking
A mobile communication device that may be used by an investigator to secretly record a suspect and track the investigator's location includes a microphone for detecting sounds, a communication component for transmitting signals or data representative of the sounds to one of the portable computers via the wireless communication network, a...

Active adaptive thermal stealth system
The present invention relates to a thermal vision countermeasure system to enable concealment of objects from identification by thermal imaging night vision systems, including a screen made of thermoelectric modules, disposed between the target object and an IR detector. The screen, formed of at least one thermoelectric unit, is coupled to...

Stealth network attack monitoring
A particular failed connection attempt initiated by a particular source asset in a network is identified and subsequent failed connection attempts initiated by the particular source asset in the network during a time period are tracked. A low frequency sequence of failed connection attempts involving the particular source asset is detected...

Stealth mode vehicle operation
Embodiments of a system and method for controlling illumination in a vehicle passenger compartment are disclosed. In one aspect, a display system for a motor vehicle passenger compartment, comprises: at least one indicia visible to an operator of the vehicle and configured to indicate a vehicle operating condition; an indicia light...

Vertical axis wind turbine with cambered airfoil blades
A wind turbine having blades that rotate in a horizontal plane about a vertical axis. A single output shaft is directly connected by one-way bearings to the driven shaft of a permanent magnet generator. This eliminates the need for a gearbox and also eliminates the need for inverters. Friction losses are...

Stealth packet switching
Stealth packets, network elements, and networks may be further enhanced with encryption techniques by encrypting various parts of, or the entire packet structure itself, for example, headers, preambles, payload, and/or other packet elements. Using encryption to modify the packet structure itself adds an entirely new level of encryption complexity, thus making...

Systems and processes for employment job centers
An employment server in communication over an Internet with a plurality of job candidates and with a plurality of businesses and related methods are disclosed. The web site stores and provides upon request a plurality of job candidate web pages, each have a set of job qualifications. It also stores and...

Anterior spine array clamp
An apparatus that connects an imaging treatment guidance system (ITGS) to a fixed location in a patient. One example of an ITGS is the Medtronic StealthStation® Treatment Guidance System used in the O-arm™ Surgical Imaging System. The apparatus is fixed relative to a patient at a proximal end, and supports the...

System, method, and device for intelligence gathering and position tracking
A mobile communication device that may be used by an investigator to secretly record a suspect and track the investigator's location includes a microphone for detecting sounds, a communication component for transmitting signals or data representative of the sounds to one of the portable computers via the wireless communication network, a...

Popular terms

[SEARCH]

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Stealth patents



      
           
This page is updated frequently with new Stealth-related patents. Subscribe to the Stealth RSS feed to automatically get the update: related Stealth RSS feeds.

Subscribe to updates on this page: Stealth RSS RSS

Date/App# patent app List of recent Stealth-related patents


Popular terms: [SEARCH]



Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patents related to Stealth for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Stealth with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



1.5377

6

3 - 0 - 0