Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,520,039 Method for securing an electronic device having a signal output against removal from a carrying device, and...
A method for securing an electronic device comprising a signal output and an input apparatus against removal from a carrying device. The method includes...
US-9,519,847 Traceable labeling apparatus for containers of biological products
An apparatus for identifying a patient and marking containers of biological products or test tubes (13) associated with said patient before collecting said...
US-9,519,821 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,519,818 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,519,803 Secure environment for graphics processing units
In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the...
US-9,519,797 Secure database searching
Methods and systems for securely storing data in a database are described herein. According to an aspect, a technique may include receiving data to be stored,...
US-9,519,793 Secure document repository
Embodiments for secure data storage that include systems and methods that receive, from a second system maintained by a second entity, a data payload to be...
US-9,519,787 Secure creation of encrypted virtual machines from encrypted templates
Booting a machine in a secure fashion in a potentially unsecure environment. The method includes a target machine beginning a boot process. The method further...
US-9,519,782 Detecting malicious network content
Systems and methods for detecting malicious content on portable data storage devices or remote network servers are provided. In an exemplary embodiment, a...
US-9,519,776 Computer security system and method
The present invention is a computer security system and method in which the various algorithms not only do not search for or detect the presence of a...
US-9,519,772 Relevancy improvement through targeting of information based on data gathered from a networked device...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with...
US-9,519,759 Secure access to programming data
Embodiments for preventing data loss and allowing selective data access are provided. In some embodiments, the system and method are configured to receive task...
US-9,519,616 Secure archive
Storage apparatus (20) includes a memory (30) and an encryption processor (28), which is configured to receive and encrypt data transmitted from one or more...
US-9,519,554 Storage system with rebuild operations
In a storage system which supports a redundant disk configuration, while securing fault tolerance, a longer drive access time as well as a drop in I/O...
US-9,519,550 Persistent client-to-replication system communications
In one aspect, a method includes generating a secure connection with a replication system using credentials, receiving a user-initiated command to control the...
US-9,519,433 Secure virtual sector erasure method and system
Systems and methods for sanitizing physical storage in cloud computing and virtual environments. When logical storage is decommissioned in a virtual...
US-9,516,755 Multi-channel memory module
Embodiments of the invention describe a motherboard PCB having a memory bus to receive signal data from a channel of memory chips/devices of a memory module....
US-9,516,607 Method for determining transmission power
There is a provided a method for deciding transmission power to securely transmit data, the method comprising: determining a transmission rate toward an...
US-9,516,505 Security mechanism for mobile users
A wireless communication device for use in a cellular network. The device comprises a radio interface for enabling communication between the device and a base...
US-9,516,466 Establishing presence by identifying audio sample and position
Systems and methods to capture, in a first device, a sample of audio data streaming from a server, transmit the sample to the server, and receive, in the first...
US-9,516,460 Systems and methods for security checkpoint condition information and sharing
Various embodiments discussed herein disclose a system comprising a user location engine, a checkpoint identification engine, a checkpoint identification...
US-9,516,364 Secure transcoding of content
A source device determines content rights for encrypted content in the first encoding standard using a first rights data file. The source device creates a...
US-9,516,362 Devices, systems and methods for reducing switching time in a video distribution network
When switching sources, resolutions or refresh rates in a video distribution network, switching times are reduced by maintaining video lock and security...
US-9,516,281 Systems and methods for automated cloud-based analytics for security surveillance systems with mobile input...
Systems and methods for cloud-based surveillance for a target surveillance area are disclosed. At least two input capture devices and at least one user device...
US-9,516,083 Method and apparatus for providing enhanced streaming content delivery with multi-archive support using secure...
A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically...
US-9,516,062 System and method for determining and using local reputations of users and hosts to protect information in a...
A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in...
US-9,516,053 Network security threat detection by user/user-entity behavioral analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,516,049 Packet capture and network traffic replay
Implementations disclosed herein provide a network agent embodied in firmware and/or software that replays network traffic of an enterprise network to an entity...
US-9,516,046 Analyzing a group of values extracted from events of machine data relative to a population statistic for those...
A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could...
US-9,516,041 Cyber security analytics architecture
Systems and methods are disclosed for responding to security events in real time. The disclosed systems and methods utilize the vast amount of risk and asset...
US-9,516,040 Systems and methods for providing security services during power management mode
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
US-9,516,021 Secure management of a smart card
A smart card includes a processing circuit, a memory that contains a protected object, an activity detector that receives a signal that describes a planned...
US-9,516,017 System and device for consolidating SIM, personal token, and associated applications for electronic wallet...
The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification....
US-9,516,006 Re-programmable secure cryptographic device
A re-programmable wireless cryptographic device can store data securely and use near field communication (NFC) to exchange functionality data and/or program...
US-9,516,002 Systems and methods for securing data in motion
Two approaches are provided for distributing trust among certificate authorities. Each approach may be used to secure data in motion. One approach provides...
US-9,515,998 Secure and scalable detection of preselected data embedded in electronically transmitted messages
A method and apparatus for detecting preselected data embedded in electronically transmitted messages is described. In one embodiment, the method comprises...
US-9,515,985 Platform for private internet protocol (IP) cloud services
A device receives data from a user device, where the data is associated with a customer address, and the customer address is associated with the user device....
US-9,515,917 Communications apparatus, system, and communications method
A given sensor node, upon determining that data processing requested by another sensor node cannot be completed by the given sensor node, selects a sensor node...
US-9,515,822 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-9,515,522 Method and apparatus for secure energy delivery
A solar power conversion device has an embedded security module for creating trusted metering data in relation to power generated and for delivering it to a...
US-9,515,420 Quick connect interface
A quick connect adaptor for conveying data or data and power from a first electronic unit to a second electronic unit. The adaptor includes a connectable...
US-9,514,841 Implementing eFuse visual security of stored data using EDRAM
A method and circuit for implementing Electronic Fuse (eFuse) visual security of stored data using embedded dynamic random access memory (EDRAM), and a design...
US-9,514,453 Dynamically reacting policies and protections for securing mobile financial transaction data in transit
A secure mobile financial transaction is provided by receiving, over a communication network, a list of protection mechanisms available for implementation by an...
US-9,514,398 Securely printing a document
Securely printing a document. Receiving, by a server computer, a request from a client computer to allocate a printer satisfying a set of security requirements....
US-9,514,370 Systems and methods for automated 3-dimensional (3D) cloud-based analytics for security surveillance in...
Systems and methods for cloud-based surveillance for an operation area are disclosed. At least two input capture devices, at least one safety control device and...
US-9,514,334 Decentralized token table generation
New tokenization tables are derived at intervals in order to increase the security of tokenized data that is transferred between two endpoints. Generation of...
US-9,514,330 Meta-complete data storage
The invention described herein generally relates to systems and methods of securely storing data so that the data contains information about the data and/or the...
US-9,514,327 Litigation support in cloud-hosted file sharing and collaboration
In embodiments, the disclosure provides a method for managing content, including providing an electronic discovery facility of a secure data exchange...
US-9,514,319 Database and method for controlling access to a database
A method for controlling access to a database is disclosed, as well as a corresponding database system. The method comprises: receiving, from a user, a request...
US-9,514,317 Policy-based trusted inspection of rights managed content
An embodiment includes a method executed by at least one processor comprising: initializing first and second secure enclaves each comprising a trusted software...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.