Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,536,103 Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
US-9,536,101 System and method for controlling access to data using API for users with disabilities
Disclosed are systems and methods for controlling access to data on mobile devices using an accessibility API for users with disabilities. An exemplary method...
US-9,536,095 System for booting and dumping a confidential image on a trusted computer system
A computer system for booting a confidential image on a trusted computer system. A trusted computer system loads an encrypted client image key onto a protected...
US-9,536,094 Mediated secure boot for single or multicore processors
A system and methods are disclosed for securely booting a processing system using a three step secure booting process. Several embodiments are presented,...
US-9,536,083 Securing data on untrusted devices
One example method for securing data on untrusted devices includes the steps of identifying, by a first process, a command in a command queue, the command from...
US-9,536,079 Safely executing an untrusted native code module on a computing device
A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of...
US-9,536,078 Integrated circuit for cyber security processing
In one aspect, an integrated circuit (IC) includes a secure router configured as a trust anchor, a non-volatile random access memory (RAM) direct memory access...
US-9,536,055 Cabinet system
A cabinet system for securely storing items includes a cabinet housing, a controller, and at least one drawer unit. The cabinet housing has a locking mechanism,...
US-9,535,852 System and method for secured host-slave communication
Slave device circuitry, including processing circuitry which is configured to determine a new session identification value; determine a seed value using a...
US-9,535,828 Leveraging non-volatile memory for persisting data
Data temporarily stored in volatile memory (e.g., RAM) on a host machine can be protected using a component such as an NV-DIMM, which includes components such...
US-9,535,712 System and method to store data securely for firmware using read-protected storage
Embodiments of the present invention store data in read-protected storage for use by firmware and then transfer the data or data related to that stored data...
US-9,535,563 Internet appliance system and method
An Internet appliance, comprising, within a single housing, packet data network interfaces, adapted for communicating with the Internet and a local area...
US-9,535,031 Molecular receptor-based chemical field-effect transistor (CHEMFET) devices, systems, and methods for in-situ...
Embodiments include a method for securing a membrane material to a gate of a molecular receptor-based chemical field-effect transistor (CHEMFET). The method can...
US-9,532,220 Apparatus and method for authentication in wireless communication system
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-9,532,215 Secure deployment of terminals in a wireless network
A method for securely deploying a communication device in a communication network, the method comprising: storing a device identity and an associated token in...
US-9,532,197 DID line type provisioning verification
A messaging hub provides communication services for user devices associated with an enterprise office telephone number. The messaging hub establishes a secure...
US-9,532,168 Transaction based temporary and secure access
A system includes a location tracking services server (LTSS) in communication with a location owner device. A tracking packet is sent from the location owner...
US-9,532,166 Transaction based temporary and secure access
A system includes a location tracking services server (LTSS) in communication with a location owner device. A tracking packet is sent from the location owner...
US-9,532,014 Information processing system and method, information processing apparatus, image-capturing device and method,...
A feature extracting unit obtains sensor data from a plurality of sensors to calculate each feature. When an event determining unit determines the occurrence of...
US-9,531,776 Multimedia communication control unit as a secure device for multimedia communication between LAN users and...
A system and method for providing multimedia communication between a firewall protected, LAN based endpoint and an endpoint that is external to the LAN. A...
US-9,531,759 Generating accurate preemptive security device policy tuning recommendations
An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a...
US-9,531,745 Crowd-sourced security analysis
A cloud-based static analysis security tool that is accessible by a set of application development environments is augmented to provide for anonymous knowledge...
US-9,531,741 Controlling a computer system
A method and apparatus for control of a computer system are disclosed. The computer system includes a terminal for operator based monitoring of the computer...
US-9,531,738 Cyber security adaptive analytics threat monitoring system and method
A system and method of detecting command and control behavior of malware on a client computer is disclosed. One or more DNS messages are monitored from one or...
US-9,531,737 Method and vehicle-to-X communication system for selectively checking data security sequences of received...
A method for selectively checking data security sequences of received vehicle-to-X messages, in which a number of the vehicle-to-X messages are received and/or...
US-9,531,717 Method of securing access to data or services that are accessible via a device implementing the method and...
The invention allows to secure access to data or services that are available for devices and applications via a device implementing the method. In order to...
US-9,531,704 Efficient network layer for IPv6 protocol
An electronic device may include a network interface that may enable the electronic device to wirelessly couple the electronic device to other electronic...
US-9,531,699 Electronic protected health information security for digital medical treatment room
A medical imaging system includes a data store having stored medical imaging data and a computer. The system may be in a medical treatment room and is adapted...
US-9,531,683 Secure connection between a data repository and an intelligence application
Embodiments of the invention are directed to systems, methods and computer program products for establishing a secure connection between a data repository and...
US-9,531,681 Method for the authentication of applications
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a...
US-9,531,680 Method and apparatus for secure data transmissions
An apparatus, system, and method are disclosed for secure data transmissions. In one embodiment, a method includes receiving a request for data from a remote...
US-9,531,679 Content-based transport security for distributed producers
A content-producing computer system can use a locally generated key or a client-generated key to communicate with a client device during a session over a...
US-9,531,672 Network device implementing two-stage flow information aggregation
A network security device includes a network flow statistics processing engine to process network flow information related to network flows. The network flow...
US-9,531,670 System and method for network virtualization and security using computer systems and software
Methods and systems are provided for network security. In one embodiment, the method involves receiving a data packet (e.g., from a firewall). The method also...
US-9,531,669 Bi-directional data security for supervisor control and data acquisition networks
A cyber-security device provides secure communications bi-directionally between an external network and an internal network including a supervisor control and...
US-9,531,593 Takeover processes in security network integrated with premise security system
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a...
US-9,531,580 Method, apparatus, and computer program product for dynamic security based grid routing
A method of routing data that is part of a grid job including steps of: receiving a data packet at a routing device; determining whether the data packet is...
US-9,531,548 Security system for handheld wireless devices using time-variable encryption keys
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time...
US-9,531,544 Two-dimensional bar code for ID card
A method and apparatus for an identity card having improved security features. The identity card can have a two-dimensional bar code or similar encoding of data...
US-9,531,538 Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing...
Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who...
US-9,531,535 Secure memories using unique identification elements
Various embodiments of the invention relate to secure systems and modules, and more particularly, to systems, devices and methods of generating and applying...
US-9,531,532 Method for establishing a secure communication channel
The present invention provides a method for establishing a secure communication channel between a client (C) and a remote server (S), said client (C) and remote...
US-9,531,531 Methods and devices for fixed execution flow multiplier recoding and scalar multiplication
One feature pertains to an electronic device that includes a memory circuit and a processing circuit. The processing circuit computes a scalar multiplication...
US-9,530,436 Methods and systems for providing data security in data storage devices
A data storage device comprising a storage media and a controller is disclosed. The controller is configured to receive a write command including a logical...
US-9,530,303 Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
US-9,530,294 Methods and apparatus for pairing items for security
An item of value comprises an assembly of parts. The parts comprise a component that has value independent of the item, and an assembly security system that is...
US-9,530,176 Image processing apparatus and method for processing image thereof
An image processing apparatus and image processing method thereof are disclosed. The image processing apparatus includes a first image processor which includes...
US-9,530,129 Secure authentication and payment system
The present invention provides a service for allowing secure financial transactions to be carried out, the service involving authenticating a user's identity...
US-9,530,126 Secure mobile payment processing
A system for processing payment data includes a payer terminal, a recipient terminal, and a payment server. The payer terminal is adapted to return, to the...
US-9,530,060 System and method for building automation using video content analysis with depth sensing
A method and system for monitoring buildings (including houses and office buildings) by performing video content analysis based on two-dimensional image data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.