Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,524,005 Data center server racks
An example data center server rack may generally include a cabinet, a mounting fixture, and a trough. The mounting fixture may support one or more server units...
US-9,522,688 On-board device, signaling system, and control method of moving vehicle
An on-board device is loaded in a moving vehicle traveling on a track. The on-board device determines whether or not a traveling route has been secured, based...
US-9,521,546 Secure RF communication method, terminal and system
A method, terminal and secure RF communication system are provided. The method for radio frequency secure communication of the invention comprises: generating...
US-9,521,187 Managed filed transfer utilizing dynamic horizontal and vertical scaling
An apparatus, methods, and computer program products are described which transfer files/data from one system to other. Source and target system can be external...
US-9,521,172 Method and system for sharing online content
A system and a computer-implemented method for sharing online content are provided. The method is implemented using a computer device coupled to a user...
US-9,521,166 Systems and methods for testing online systems and content
Systems and methods are provided for automatically monitoring a compliance of web pages and graphical user interfaces with governmental and self-regulatory...
US-9,521,159 Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
US-9,521,145 Methods and apparatuses to provide secure communication between an untrusted wireless access network and a...
A secure communication channel between an access point (AP) device associated with a wireless network and a mobile gateway (GW) device of a packet core network...
US-9,521,135 Method and system for a computer-based, secured communication between data processing units
In a method and a system for a computer-based and secured communication between data processing units a sender selects an alphanumeric and/or image data set,...
US-9,521,132 Secure data storage
A method and apparatus for storing data and performing logical comparisons and other operations on said data, the results of said comparisons and operations...
US-9,521,122 Intelligent security analysis and enforcement for data transfer
An approach is provided for managing a message in a transfer from a computer. A level of sensitivity of data in a payload of the message is determined. A level...
US-9,521,120 Method for securely transmitting control data from a secure network
This method securely transmits data from a secure control system [110] located on an isolated computer network [100] to a separate computer [210] outside the...
US-9,521,118 Secure network privacy system
The invention provides a method and system of receiving communications from a network device in a network to a source of network data and establishing a secure...
US-9,520,999 Systems and methods for identifying an individual
The present application relates to systems and methods using biometric data of an individual for identifying the individual and/or verifying the identity of an...
US-9,520,039 Method for securing an electronic device having a signal output against removal from a carrying device, and...
A method for securing an electronic device comprising a signal output and an input apparatus against removal from a carrying device. The method includes...
US-9,519,847 Traceable labeling apparatus for containers of biological products
An apparatus for identifying a patient and marking containers of biological products or test tubes (13) associated with said patient before collecting said...
US-9,519,821 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,519,818 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,519,803 Secure environment for graphics processing units
In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the...
US-9,519,797 Secure database searching
Methods and systems for securely storing data in a database are described herein. According to an aspect, a technique may include receiving data to be stored,...
US-9,519,793 Secure document repository
Embodiments for secure data storage that include systems and methods that receive, from a second system maintained by a second entity, a data payload to be...
US-9,519,787 Secure creation of encrypted virtual machines from encrypted templates
Booting a machine in a secure fashion in a potentially unsecure environment. The method includes a target machine beginning a boot process. The method further...
US-9,519,782 Detecting malicious network content
Systems and methods for detecting malicious content on portable data storage devices or remote network servers are provided. In an exemplary embodiment, a...
US-9,519,776 Computer security system and method
The present invention is a computer security system and method in which the various algorithms not only do not search for or detect the presence of a...
US-9,519,772 Relevancy improvement through targeting of information based on data gathered from a networked device...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with...
US-9,519,759 Secure access to programming data
Embodiments for preventing data loss and allowing selective data access are provided. In some embodiments, the system and method are configured to receive task...
US-9,519,616 Secure archive
Storage apparatus (20) includes a memory (30) and an encryption processor (28), which is configured to receive and encrypt data transmitted from one or more...
US-9,519,554 Storage system with rebuild operations
In a storage system which supports a redundant disk configuration, while securing fault tolerance, a longer drive access time as well as a drop in I/O...
US-9,519,550 Persistent client-to-replication system communications
In one aspect, a method includes generating a secure connection with a replication system using credentials, receiving a user-initiated command to control the...
US-9,519,433 Secure virtual sector erasure method and system
Systems and methods for sanitizing physical storage in cloud computing and virtual environments. When logical storage is decommissioned in a virtual...
US-9,516,755 Multi-channel memory module
Embodiments of the invention describe a motherboard PCB having a memory bus to receive signal data from a channel of memory chips/devices of a memory module....
US-9,516,607 Method for determining transmission power
There is a provided a method for deciding transmission power to securely transmit data, the method comprising: determining a transmission rate toward an...
US-9,516,505 Security mechanism for mobile users
A wireless communication device for use in a cellular network. The device comprises a radio interface for enabling communication between the device and a base...
US-9,516,466 Establishing presence by identifying audio sample and position
Systems and methods to capture, in a first device, a sample of audio data streaming from a server, transmit the sample to the server, and receive, in the first...
US-9,516,460 Systems and methods for security checkpoint condition information and sharing
Various embodiments discussed herein disclose a system comprising a user location engine, a checkpoint identification engine, a checkpoint identification...
US-9,516,364 Secure transcoding of content
A source device determines content rights for encrypted content in the first encoding standard using a first rights data file. The source device creates a...
US-9,516,362 Devices, systems and methods for reducing switching time in a video distribution network
When switching sources, resolutions or refresh rates in a video distribution network, switching times are reduced by maintaining video lock and security...
US-9,516,281 Systems and methods for automated cloud-based analytics for security surveillance systems with mobile input...
Systems and methods for cloud-based surveillance for a target surveillance area are disclosed. At least two input capture devices and at least one user device...
US-9,516,083 Method and apparatus for providing enhanced streaming content delivery with multi-archive support using secure...
A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically...
US-9,516,062 System and method for determining and using local reputations of users and hosts to protect information in a...
A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in...
US-9,516,053 Network security threat detection by user/user-entity behavioral analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,516,049 Packet capture and network traffic replay
Implementations disclosed herein provide a network agent embodied in firmware and/or software that replays network traffic of an enterprise network to an entity...
US-9,516,046 Analyzing a group of values extracted from events of machine data relative to a population statistic for those...
A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could...
US-9,516,041 Cyber security analytics architecture
Systems and methods are disclosed for responding to security events in real time. The disclosed systems and methods utilize the vast amount of risk and asset...
US-9,516,040 Systems and methods for providing security services during power management mode
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
US-9,516,021 Secure management of a smart card
A smart card includes a processing circuit, a memory that contains a protected object, an activity detector that receives a signal that describes a planned...
US-9,516,017 System and device for consolidating SIM, personal token, and associated applications for electronic wallet...
The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification....
US-9,516,006 Re-programmable secure cryptographic device
A re-programmable wireless cryptographic device can store data securely and use near field communication (NFC) to exchange functionality data and/or program...
US-9,516,002 Systems and methods for securing data in motion
Two approaches are provided for distributing trust among certificate authorities. Each approach may be used to secure data in motion. One approach provides...
US-9,515,998 Secure and scalable detection of preselected data embedded in electronically transmitted messages
A method and apparatus for detecting preselected data embedded in electronically transmitted messages is described. In one embodiment, the method comprises...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.