Patent application number | Description | Published |
20100270924 | FLEXIBLE LIGHT EMITTING/CHARGE STORAGE DEVICE AND SYSTEM - A light emitting/charge storage device is disclosed. The light emitting/charge storage device includes an organic light emitting diode (OLED) portion and at least one charge storage portion electrically and physically connected therewith. The OLED portion includes a first anode layer, a first cathode layer, and an electroluminescent layer disposed at least partially between the first anode layer and the first cathode layer. The at least one charge storage portion includes a second anode layer, a second cathode layer, and an ionic polymer dielectric layer disposed at least partially between the second anode layer and the second cathode layer, and/or a thin film battery layer. A light emitting/charge storage system is also disclosed. Certain embodiments of the device and system of the invention may provide integrated illumination and charge storage in a unitary stacked layered structure with flexible mechanical characteristics. | 10-28-2010 |
20100271174 | Security document with electroactive polymer power source and nano-optical display - A security document is disclosed which includes an electrical circuit embedded in a document substrate, where the electrical circuit includes a power source with at least one electroactive polymer power generator, and an optical display including at least one electroluminescent display element and at least one nanohole array which forms a layer of the electroluminescent display element. A method of authenticating a security document is also disclosed, the method including illuminating an encoded nanohole array in the security document with a focused light beam or laser light source emitting at least one defined wavelength of incident light, detecting a transmitted portion of the incident light transmitted through the nanohole array with an optoelectronic sensor, analyzing at least one wavelength of the transmitted portion of light to produce a detected signal, and comparing the detected signal with an authentication signal to authenticate the security document. | 10-28-2010 |
20100271755 | IONIC POLYMER METAL COMPOSITE CAPACITOR - An ionic polymer metal composite (IPMC) capacitor is disclosed which includes a thin single layer non-hydrated ionic polymer substrate with conductive film electrodes applied to at least a portion of each side of the non-hydrated ionic polymer substrate. The disclosed capacitor is suited for providing thin capacitance structures made to substantially any desired dimensions and shape and may be particularly suited for short term power storage in low power electronics, sensors, micro-electronics, MEMs and high temperature applications. A method of manufacturing an IPMC capacitor is also disclosed including providing a thin single layer non-hydrated ionic polymer substrate, applying a conductive film electrode to both sides of the substrate, and attaching electrical connections to the electrodes. The disclosed method of manufacture may optionally also include heat curing the capacitor and coating the capacitor with at least one moisture-resistant protective coating layer. | 10-28-2010 |
20110127508 | ORGANIC ELECTRONIC DEVICE AND METHOD OF MANUFACTURE - An organic electronic device (e.g. OLED, OPV, OES, OTFT) is disclosed. The organic electronic device includes a carrier substrate, a first electrode layer disposed on the carrier substrate, an organic active electronic region disposed on the first electrode layer, and an indium second electrode layer disposed and formed on the organic active electronic region by applying heat on an indium solid at a temperature between the melting temperature of indium and a threshold operating temperature of the organic layers to melt the indium solid on the organic active electronic region. The organic active electronic region includes one or more organic layers. A method of manufacturing an organic electronic device is also disclosed. | 06-02-2011 |
20120038463 | SECURITY DOCUMENT WITH ELECTROACTIVE POLYMER POWER SOURCE AND NANO-OPTICAL DISPLAY - A security document is disclosed which includes an electrical circuit embedded in a document substrate, where the electrical circuit includes a power source with at least one electroactive polymer power generator, and an optical display including at least one electroluminescent display element and at least one nanohole array which forms a layer of the electroluminescent display element. Security features comprising nanohole arrays are also provided. A method of authenticating a security document is disclosed, including illuminating an encoded nanohole array in the security document with a focused light beam or laser light source emitting at least one defined wavelength of incident light, detecting a transmitted portion of the incident light transmitted through the nanohole array with an optoelectronic sensor, analyzing at least one wavelength of the transmitted portion of light to produce a detected signal, and comparing the detected signal with an authentication signal to authenticate the security document. | 02-16-2012 |
20130153861 | ORGANIC OPTOELECTRONIC DEVICES WITH SURFACE PLASMON STRUCTURES AND METHODS OF MANUFACTURE - An organic optoelectronic device is disclosed. The organic optoelectronic device includes a carrier substrate, an anode electrode layer disposed at least partially on the carrier substrate, an organic electronic active region including one or more organic layers and disposed at least partially on the anode electrode layer, and a cathode electrode layer disposed at least partially on the organic photoactive layer. The anode electrode layer has a periodic array of sub-wavelength nanostructures. Methods of manufacturing an organic optoelectronic device are also disclosed. | 06-20-2013 |
20160056380 | ORGANIC ELECTRONIC DEVICE AND METHOD OF MANUFACTURE - An organic electronic device (e.g. OLED, OPV, OES, OTFT) is disclosed. The organic electronic device includes a carrier substrate, a first electrode layer disposed on the carrier substrate, an organic active electronic region disposed on the first electrode layer, and an indium second electrode layer disposed and formed on the organic active electronic region by applying heat on an indium solid at a temperature between the melting temperature of indium and a threshold operating temperature of the organic layers to melt the indium solid on the organic active electronic region. The organic active electronic region includes one or more organic layers. A method of manufacturing an organic electronic device is also disclosed. | 02-25-2016 |
20160107471 | NANOSTRUCTURE ARRAY DIFFRACTIVE OPTICS FOR RGB AND CMYK COLOR DISPLAYS - An RGB and/or CMYK full color optical display device comprising multiple nanostructure arrays configured to provide display of a wide range of colors corresponding to multiple pixels or sub-regions of an image is disclosed, where the multiple nanostructure arrays may be formed on a single substrate layer. An optical display device includes a substrate having a surface, and a first pixel of a color image comprising first and second sub-pixels according to at least one of an additive and subtractive color scheme, where the first sub-pixel comprises a first optical sub-wavelength nanostructure array formed on or in the surface of the substrate, and where the second sub-pixel comprises a second optical sub-wavelength nanostructure array formed on or in the surface of the substrate. A method of manufacturing an RGB and/or CMYK full color optical display comprising multiple nanostructure arrays arranged as sub-pixels according to a color scheme is also disclosed. | 04-21-2016 |
20160116649 | NANOSTRUCTURE ARRAY DIFFRACTIVE OPTICS FOR MOTION AND ANIMATION DISPLAY - A motion and animation display is disclosed, including multiple nanostructure arrays oriented at differing relative angles of rotation corresponding to multiple frames of an animation image, wherein the multiple nanostructure arrays are formed on a single substrate layer. An optical display device is also disclosed, including a substrate having a surface, a first frame of an animated image comprising a first optical sub-wavelength nanostructure array formed on or in the surface of the substrate, and a second frame of an animated image comprising a second optical sub-wavelength nanostructure array formed on or in the surface of the substrate, where the second nanostructure array is rotated relative to the first nanostructure array by a first relative angle of rotation. A method of manufacturing a motion and animation display comprising multiple nanostructure arrays oriented at differing relative angles of rotation is also disclosed. | 04-28-2016 |
Patent application number | Description | Published |
20090214027 | PROTECTING AGAINST SECURITY ATTACK - A communication device having a private key and configured to implement an elliptic curve security mechanism for successful operation of which it: (a) receives a first value from another device, (b) computes a second value as the scalar multiplication of the first value with its private key and (c) returns that second value for use by the other device; the mechanism being such that the first value defines a pair of coordinates representing a first point and the second value defines a pair of coordinates representing a second point and being such that the first value is valid only if it lies on an elliptic curve of predefined form; the device being configured to implement the mechanism by the steps of: receiving data as the first value; making a first evaluation as to whether the first value is a singular point with respect to the elliptic curve; computing the second value as the scalar multiplication of the first value with the private key; making a second evaluation as to whether the second value lies on the elliptic curve; and returning the second value only if the first evaluation is false and the second evaluation is true. | 08-27-2009 |
20100191977 | DATA CERTIFICATION METHOD AND APPARATUS - Apparatus for certifying electronic data supplied by a user receives data to be signed, supplied by the user from a source device, at a certifying apparatus including at least a signature server providing a signing function. An encrypted password is received at that server from the source device via a first communication path, the password being generated by an authentication system providing an authentication function separate from the signing function and the password being transmitted to the source device via a second communication path, the signature server and the authentication system have different communication paths with the source device. A version of the encrypted password is communicated between the signature server and the authentication system via a third communication path, different to the first and second paths, for authenticating the user. A result of the authenticating of the user is determined at the signature server by the communication between the authentication system and the signature server, that result being determined by verification of the version of the encrypted password, that verification being performed without the signature server verifying the actual plaintext password. The data to be signed is signed using elements of information secure to the signature server if the result of the authentication indicates that the user is authenticated. The signed data from the certifying apparatus is then passed to a recipient device so that the elements of secure information certify that the data supplier is the user. A method of certifying the data is also disclosed. | 07-29-2010 |
20120171997 | ENCODED COLORGRAM FOR MOBILE DEVICE SECURITY - A security system includes a software application running in a user's smartphone and a separately carried visual key that the user can image at will with the smartphone's camera. An effective visual key would typically comprise digital data encoded in a series of colored cells arranged in a colorgram. Such digital data is treated as a what-you-have security factor, and is concatenated with other security factors so users can authenticate themselves to websites, internet services, and even within the smartphone device itself or its applications. In one aspect, when users authenticate themselves to a server, the server returns a short-term supply of one-time-passwords or account numbers for use in secure access and financial transactions on other systems. | 07-05-2012 |
20120278241 | TRACEABLE AND NON-REPUTABLE TRANSACTION DEVICES AND METHODS - Data and financial transactions are secured on a mobile electronics device for traceability and non-repudiation. A mobile personal trusted device (PTD) is needed to communicate over a network to a transaction server. Characteristic abstracts of objects carried by users have distinctive features that can be associated with and registered to a particular user and are recorded. An abstract contemporaneously obtained during a secure transaction is sent to a server for use as an authenticator for comparison to an abstract previously obtained and registered to said user. A traceable transaction record is rendered that is highly identifiable and substantially indisputable. | 11-01-2012 |
20120311320 | Mobile Transaction Methods and Devices With Three-Dimensional Colorgram Tokens - A transaction security process includes authentication and identification parts for pushing an encrypted colorgram for user authentication and persona descriptors for user identification from a transaction server to a first personal trusted device. A decryption of the colorgram is displayed on the first personal trusted device. An image is captured by a second personal trusted device. An encryption of the image captured from the second personal trusted device is uploaded to the transaction server. The persona descriptors are used to build a composite rendering for identification of the first user to the second user. The second user clicks “OK” if they recognize the composite drawing as a reasonable persona of the first user. | 12-06-2012 |
20130226812 | CLOUD PROXY SECURED MOBILE PAYMENTS - A secure payment system provisions a payment transaction proxy with virtual EMV-type chipcards on secure backend servers. Users authorize the proxy in each transaction to make payments in the Cloud for them. The proxy carries out the job without exposing the cryptographic keys to risk. User, message, and/or device authentication in multifactor configurations are erected in realtime to validate each user's intent to permit the proxy to sign for a particular transaction on the user's behalf. Users are led through a series of steps by the proxy to validate their authenticity and intent, sometimes incrementally involving additional user devices and communications channels that were pre-registered. Authentication risk can be scored by the proxy, and high risk transactions that are identified are tasked by further incrementally linking in more user devices, communications channels, and user challenges to increase the number of security factors required to authenticate. | 08-29-2013 |
20140089202 | CRM Security Core - A security core supports a networked banking app for a client application device communicating with a server, such as e.g. a smartphone. It provides a secure environment for the banking app to conduct registration, enrollment, and transaction workflows with corresponding back-end servers on the network. It includes defenses against static analysis, attempts at reverse engineering, and real-time transaction fraud. A principal defense employed is obfuscation of the protocols, APIs, algorithms, and program code. It actively detects, thwarts, misdirects, and reports reverse engineering attempts and malware activity it senses. A routing obfuscator is configured to operate at the outer layer. Previous core designs are retained as camouflage. An internal TLS library is used rather than the OS TLS layer. Cookies are managed internally in the core rather than in the webkit-browser layer. | 03-27-2014 |
20150142667 | PAYMENT AUTHORIZATION SYSTEM - A payment authorization system includes a network server configured to create strong bindings between individual user identifiers and a peculiar combination of devices corresponding users employ, and the associated communications services each utilizes. The combination of user-devices-services reduces the possibilities to the one user who is authorized to establish access to a set of security keys held by another secure server. The principal goal being to authorize a payment transaction without exposing the security keys. A secure backend payment server is configured to produce a surrogate output that will satisfy a payment processor when asked to do so by an authorized user. Such surrogate duplicates what a payment chip card or secure element would have presented in person, but here the security keys never have to leave the backend payment server. | 05-21-2015 |
20160117673 | SYSTEM AND METHOD FOR SECURED TRANSACTIONS USING MOBILE DEVICES - A secure payment system provisions a payment transaction proxy with virtual EMV-type chipcards on secure backend servers. Users authorize the proxy in each transaction to make payments in the Cloud for them. The proxy carries out the job without exposing the cryptographic keys to risk. User, message, and/or device authentication in multifactor configurations are erected in realtime to validate each user's intent to permit the proxy to sign for a particular transaction on the user's behalf. Users are led through a series of steps by the proxy to validate their authenticity and intent, sometimes incrementally involving additional user devices and communications channels that were pre-registered. Authentication risk can be scored by the proxy, and high risk transactions that are identified are tasked by further incrementally linking in more user devices, communications channels, and user challenges to increase the number of security factors required to authenticate. | 04-28-2016 |