Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,763,164 System and method for enabling VPN-less session setup for connecting mobile data devices to an enterprise data...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
US-9,763,096 Mobile application identification and control through WiFi access points
A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones,...
US-9,763,089 Protecting sensitive data in a security area
Managing data security on a mobile device. Data associated with a mobile device is received; the data includes an identification (ID) of the mobile device and a...
US-9,763,063 Secure broadcast beacon communications
Using various embodiments, methods and systems for secure Bluetooth Low Energy communications, in an unconnected state, are described herein. In one embodiment,...
US-9,762,678 Method, apparatus and computer program for modifying an endpoint reference representing a web service endpoint
WS-Addressing EndpointReferences represent Web service endpoints and are propagated in the SOAP Envelope as part of Web service interactions. There is disclosed...
US-9,762,675 System and method for secure real-time cloud services
A system and method for providing secure, end-to-end data service enabling real-time data over the Internet is disclosed. The system and method provides a...
US-9,762,617 Security threat information analysis
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing data that includes security threat information....
US-9,762,615 Management apparatus and method for controlling management apparatus
A device management apparatus sets a first password required to reflect a security policy managed by the device management apparatus on a device or change the...
US-9,762,603 Assessment type-variable enterprise security impact analysis
A data management service identifies sensitive data stored on enterprise databases according to record classification rules that classify a data record as...
US-9,762,595 Secure cross domain solution systems and methods
Generally discussed herein are systems, apparatuses, and methods for secure transfer of content across a security boundary. A system can include a high side...
US-9,762,585 Tenant lockbox
Tenant approval for operator access to tenant data is provided. In order to grant service personnel operators access to a tenant's data for performing a...
US-9,762,575 Method for performing communication via fingerprint authentication and electronic device thereof
A method is provided for operating a first electronic device. The method includes determining sameness of first fingerprint data and second fingerprint data....
US-9,762,571 Securing connections to unsecure internet resources
There is provided a method for automatically intercepting two or more data packets transported over a computer network, where the data packets originated from...
US-9,762,554 Handling of performance monitoring data
System, methods, nodes, and computer program for handling performance monitoring data in a communication network are described. The communication network (100)...
US-9,762,553 Systems and methods of secure data exchange
In embodiments of the present invention improved capabilities are described for managing digital rights management (DRM) protected content sharing in a...
US-9,762,552 Efficient sensor data delivery
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
US-9,762,550 Low latency active noise cancellation system with client intercommunication
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content...
US-9,762,548 Controlling encrypted data stored on a remote storage device
A method, system, and apparatus are provided for controlling encrypted data stored on a remote device. In particular, a remote device includes a storage...
US-9,762,547 System and method for routing-based internet security
Method and system for improving the security of storing digital data in a memory or its delivery as a message over the Internet from a sender to a receiver...
US-9,762,538 Flow ownership assignment in a distributed processor system
A security device for processing network flows includes one or more packet processors configured to receive incoming data packets associated with one or more...
US-9,762,536 One way secure link
A method for secure communications between a transmitting computer (24) and a receiving computer (22) includes transmitting data from the transmitting computer...
US-9,762,531 Position parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
US-9,762,387 Discovery and secure transfer of user interest data
A method for establishing an encrypted communication channel is described. Query IDs are generated at a first device. Each query ID identifies a keyword in a...
US-9,762,316 Lightweight pairing and connection transfer protocol via gesture-driven shared secrets
A gesture is performed by a wireless accessory attempting to pair with a device. The gesture comprises a series of user interactions associated with accessory...
US-9,761,104 Baggage identification and location system
A baggage identification and location system is provided with a plurality of baggage tags, a software application, a data center and a plurality of scanners...
US-9,760,888 Secure mobile user interface
The invention provides systems and method for securely inputting user data from a user into a mobile device and also for generating user data to be input by a...
US-9,760,738 Storing and transmitting sensitive data
A computer-implemented method for storing and transmitting sensitive data is disclosed including storing source data on a secure data storage of a secondary...
US-9,760,729 Method, secure device, system and computer program product for securely managing user access to a file system
A method, a secure device, a system and a computer program product for securely managing user access to a file system. The method includes providing a secure...
US-9,760,728 System and method for managing logical channels for accessing several virtual profiles in a secure element
The invention is a system comprising a host device and a secure element including a plurality of virtual profiles and an execution component configured to run...
US-9,760,727 Secure host interactions
A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A...
US-9,760,721 Secure transaction method from a non-secure terminal
The invention relates to a transaction method, the method including the steps of: providing a tenninal including a main processor, a graphic processor...
US-9,760,720 Securing temporary data on untrusted devices
One example method for securing data on untrusted devices includes the steps of intercepting a file command from a software application, the file command...
US-9,760,705 Method and apparatus for making a decision on a card
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and...
US-9,760,697 Secure interactive electronic vault with dynamic access controls
Disclosed herein is a system for enabling secure data storage into a third party managed electronic vault. The electronic vault provides users with a secure...
US-9,760,681 Offline electronic health record management
Embodiments include an offline application, encrypted patient medical data records, and an encryption key that are stored in a cache of a browser application on...
US-9,760,504 Nonvolatile memory data security
Keys are generated at a memory device with a period of time elapsing between generation of each key. A request is received from a memory controller for the most...
US-9,760,446 Conveying value of implementing an integrated data management and protection system
A system and method are described for conveying to a user the value it would receive by implementing an integrated system to protect and manage its data. An...
US-9,760,359 Healthcare as a service--downloadable enterprise application
An application as a service provided in a secure environment. A sandbox in a user's computing environment may be created. An application may be downloaded to...
US-9,760,078 System for positioning a tool in a work space
A system for assisting in the use by an operator of the operating element of a tool at desired locations at a worksite, includes a stationary control and a...
US-9,758,311 Method and device for machining large sized plates in a numerical control workstation
A method and device useful for material removal from large plate-shaped materials, for example machining and polishing of glass and stone. The invention...
US-9,757,136 Arthroplasty jig and method of performing arthroplasty
A method and system for performing a total joint arthroplasty procedure on a patient's damaged bone region. A CT image or other suitable image is formed of the...
US-9,756,559 Method, system, network element, and gateway for processing access point name restriction information
A method, a system, a network element, and a gateway for processing access point name restriction information are disclosed. The method includes a second...
US-9,756,491 System and method for social sensor platform based private social network
The present systems and methods are directed to a private network of personal social sensors. The sensors are irreversibly paired with a communication device...
US-9,756,082 Scalable network security with fast response protocol
This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying...
US-9,756,079 System and method for providing network and computer firewall protection with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
US-9,756,062 Collaborative infrastructure supporting cyber-security analytics in industrial networks
A system comprising a computer-readable storage medium storing at least one program, and a method for reducing cyber-security related false positive alerts is...
US-9,756,023 Token-based secure data management
In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive...
US-9,756,017 Data leak protection in upper layer protocols
Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a packet is received by a network security...
US-9,756,016 Security services for end users that utilize service chaining
Embodiments described herein provide security for end users of User Equipment (UE) that utilize service chaining for Service Data Flows (SDFs). One embodiment...
US-9,755,953 Multi-path routing control for an encrypted tunnel
The present disclosure is directed to a system and method for applying unique routing rules to encrypted data packets being transmitted via a tunneling...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.