Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,001,3574 Method and apparatus for secure storage and retrieval of encrypted files in public cloud-computing platforms
In one aspect, a computerized Encrypted Drive System (EDS) server useful for keyword extraction and indexing server of includes a computer store containing...
US-1,001,3567 Private and public sharing of electronic assets
The embodiments set forth techniques for implementing a cloud service that enables cloud data to be shared between different users in a secure manner. One...
US-1,001,3566 System and method for managing collaboration in a networked secure exchange environment
In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations,...
US-1,001,3565 System and method for secure transport of data from an operating system to a pre-operating system environment
An information handling system includes a trusted platform module (TPM) and a storage device, the TPM provides boot authentication for the information handling...
US-1,001,3560 Securely exchanging information during application startup
Provided is a method for securely exchanging information during application startup. A processor may send a request for a passphrase to one or more remote...
US-1,001,3527 Automatically assessing an anatomical surface feature and securely managing information related to the same
A facility for procuring and analyzing information about an anatomical surface feature from a caregiver that is usable to generate an assessment of the surface...
US-1,001,3390 Secure handle for intra-and inter-processor communications
A protocol element referred to as a secure handle is described which provides an efficient and reliable method for application-to-application signaling in...
US-1,001,3385 Programmable validation of transaction requests
A data processor includes an input/output bridge that provides enforcement of a security status on transactions between devices across the bridge. The bridge...
US-1,001,3364 Securing data using per tenant encryption keys
One embodiment is directed to a technique which secures data on a set of storage drives of a data storage system. The technique involves encrypting data from a...
US-1,001,3138 Method and apparatus for secure data entry using a virtual interface
Method and apparatus for secure data entry. In the method a virtual data entry interface is generated, and is outputted so as to be readable only by the user....
US-1,001,2993 Method and system for risk modeling in autonomous vehicles
A method for adaptive risk modeling for an autonomous vehicle, the method comprising: retrieving parameters of an identified driving mission of the autonomous...
US-1,001,2406 Method and apparatus for controlling temperature
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
US-1,001,2009 Electric lock device for furniture and storage
An electric lock device for furniture or storage has an RFID transmitter/receiver for communication with portable data carriers. A controller detects a data...
US-1,001,1248 Cross correlation between connected vehicles and other online devices
Embodiments of the present invention disclose a method, computer system, and a computer program product for vehicle software security associated with a vehicle....
US-1,001,0777 Bat swing training system and method of use
A system for swing training with a bat, the system includes a training device, having a bat spacer attached to a sweet spot position on the bat about a barrel...
US-1,001,0010 Mobile video, audio, and sensory apparatus
A self-contained mobile surveillance apparatus has applicability in a variety of short or long term settings where security and documentation of activities are...
US-1,000,9180 System and method for generating auditable secure seeds from real-world data
An interface receives a first digital signature of real-world data. A memory stores the first digital signature as seed data. The interface receives a second...
US-1,000,9172 Instructions processors, methods, and systems to process secure hash algorithms
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
US-1,000,7910 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
US-1,000,7809 Fine-grained self-shredding data in a secure communication ecosystem
One embodiment provides a document management system comprising a storage system to store one or more encrypted documents, at least a first portion of a first...
US-1,000,7502 Method for upgrading communication device
A method is disclosed for updating communication equipment through a server in a communication system, wherein the server stores the updated files used for...
US-1,000,7473 Continuous glucose monitor communication with multiple display devices
A continuous glucose monitor for wirelessly transmitting data relating to glucose value to a plurality of displays is disclosed, as well as systems and methods...
US-9,998,926 Security enabled predictive mobile data caching
An approach to preemptive mobile data caching is provided, the approach involves retrieving personal user data associated with a user of a mobile computing...
US-9,998,629 Rights management in a distributed image capture system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-9,998,520 Information processing terminal and method
An information processing terminal displays a confirmation screen for confirming whether to delete data relating to a web site, in a case where a movement from...
US-9,998,496 Logging and monitoring usage of cloud-based hosted storage services
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
US-9,998,494 Methods and apparatus for secure communication in a vehicle-based data communication system
A method provides secure communication between a first module and a second module within a vehicle communication network. A first anti-replay counter is...
US-9,998,493 Systems and methods for key logger prevention security techniques
An applet may be downloaded or provided to a web browser when a user visits a site in order to protect data input by the user from being captured by malicious...
US-9,998,478 Enterprise-wide security for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
US-9,998,466 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-9,998,455 Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
US-9,998,450 Automatically generating certification documents
A certification application automatically generates a certification document associated with a service. A transformation module retrieves a component...
US-9,998,447 System and method for secure access of a remote system
A system and method for providing a user with secure access to devices operatively connected to a network comprising at least one processing device that has...
US-9,998,434 Secure dynamic communication network and protocol
In a secure cloud for transmitting packets of digital data, the packets may be repeatedly scrambled (i.e., their data segments reordered) and then unscrambled,...
US-9,998,426 Bi-directional data security for control systems
A cyber-security device includes a processor operable to process messages with a data validation rule-set; an external communication interface configured for...
US-9,998,288 Management of secret data items used for server authentication
A security device (6) is provided for facilitating management of secret data items such as cryptographic keys which are used by a remote server (2) to...
US-9,998,281 Set of servers for "machine-to-machine" communications using public key infrastructure
A set of servers can support secure and efficient "Machine to Machine" communications using an application interface and a module controller. The set of servers...
US-9,998,255 Fiber optic light intensity encryption
A fiber optic light intensity encryption method is provided. The method includes determining light intensities associated with multi-frequency light pulses...
US-9,996,837 Integration of secure protocols into a fraud detection system
Embodiments of the present invention are directed to methods and systems for performing a secure authentication process by leveraging the historical transaction...
US-9,996,792 Data carrier
The present invention relates to a data carrier, especially a security document, such as an identification card, comprising authentication data comprising...
US-9,996,711 Asset protection of integrated circuits during transport
An integrated circuit (IC) provisioned for asset protection has a primary circuit portion, such as a microprocessor or system-on-chip, that can be selectively...
US-9,996,709 Secure computer architecture
A secure computer architecture is provided. With this architecture, data is received, in a component of an integrated circuit chip implementing the secure...
US-9,996,705 Determining potential sharing of private data associated with a private network domain to improve data security
Techniques for determining potential sharing of private data are described herein. The techniques may include identifying content having computer readable...
US-9,996,698 Automated management of confidential data in cloud environments
A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality...
US-9,996,692 Method and system for using principal components analysis (PCA) to display trends in aircraft cyber events in...
A system, method, and computer readable media for using principal components analysis (PCA) to graphically display cyber event information about an aircraft or...
US-9,996,688 Systems and methods for controlling access to computer applications or data
Solutions for controlling access to computer applications or data are disclosed. For instance, certain systems advantageously secure access to applications and...
US-9,996,679 Methods and apparatus for device authentication and secure data exchange between a server application and a device
In some embodiments, a method includes sending an authentication request to a client device to obtain a utilization code in response to a request from the...
US-9,996,377 Virtual machine migration via a mobile device
Embodiments relate to virtual machine (VM) migration via a mobile device. A method includes requesting, by a mobile device, a source computer to capture a state...
US-9,996,376 Virtual machine monitoring method and system thereof
A virtual machine monitoring method and a system thereof are provided. The virtual machine monitoring method includes: detecting at least one hardware resource...
US-9,996,309 Method and apparatus for providing search information
The present disclosure relates to technologies for sensor networks, machine-to-machine (M2M), machine-type communication (MTC), and Internet of things (IoT)....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.