Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,495,680 Secure payment card transactions
Identification cards at a processing server may be secured in certain embodiments by intercepting data associated with the identification card. The data may be...
US-9,495,674 Enabling secure transactions with an underpowered device
In a system and method for enabling secure monetary transactions with an unpowered and/or underpowered user device, embodiments include a payment device...
US-9,495,652 Autonomic discrete business activity management method
Discrete Business Activity Management is a method whereby continuous streams of data formatted in one or more taxonomies, originating from two or more networked...
US-9,495,588 Biometric template security and key generation
Methods and systems for securing biometric templates and generating secret keys are provided. One or more images are received. Interest points are identified...
US-9,495,556 Secure cloud storage distribution and aggregation
Methods and systems for secure cloud storage are provided. According to one embodiment, a trusted gateway device establishes and maintains multiple...
US-9,495,550 System and method for sharing of data securely between electronic devices
A system for securely sharing data and conducting transactions in an electronic environment. The system may include a personal information device having a...
US-9,495,545 Automatically generate attributes and access policies for securely processing outsourced audit data using...
Methods, systems, and computer-readable storage media for secure storage of and selective access to encrypted audit data. Implementations include actions of...
US-9,495,544 Secure data transmission and verification with untrusted computing devices
Techniques from the proposed invention relate to providing enhanced security. For example, techniques described herein allow a computer system, such as a mobile...
US-9,495,529 Method and apparatus for measuring body balance of wearable device
A wearable device includes a communication unit that wirelessly communicates with a first external device; a motion sensor that senses the user's motion; and a...
US-9,495,528 Method and apparatus for measuring body balance of wearable device
A wearable device includes a communication unit that wirelessly communicates with a first external device; a motion sensor that senses the user's motion; and a...
US-9,495,527 Function-level lock for mobile device security
One embodiment provides an electronic mobile device comprising one or more mobile applications. Each mobile application has at least one corresponding graphical...
US-9,495,509 Method and system for planning/guiding alterations to a bone
A computer-assisted surgery system for guiding alterations to a bone, comprises a trackable member secured to the bone. The trackable member has a first...
US-9,495,257 Networking support for zone clusters based on virtualization of servers
An aspect of the present invention provides a corresponding exclusive communication stack (e.g., TCP/IP stack) for each zone entity of a server system. In an...
US-9,495,240 Encrypting data for storage in a dispersed storage network
A method begins by a dispersed storage (DS) processing module encrypting a plurality of data segments of the data using a plurality of encryption keys to...
US-9,495,142 Dynamic reconstruction of application state upon application re-launch
A service provider system may include an application fulfillment platform that delivers desktop applications on demand to desktops on physical computing devices...
US-9,495,011 Device-stylus haptic communication system
Computing devices are disclosed that use haptic technology to communicate data to a stylus device. This data may include, for example, updates to the stylus...
US-9,494,936 Robotic assistance in security monitoring
Methods, systems, and apparatus, including computer programs encoded on storage devices, for monitoring, security, and surveillance of a property. In one...
US-9,494,480 Water use monitoring apparatus
The present invention is a water use and/or a water energy use monitoring apparatus that is affixed to the hot and cold water supply piping for continuously (or...
US-9,493,238 Bystander interaction during delivery from aerial vehicle
An unmanned aerial vehicle (UAV) is disclosed that includes a retractable payload delivery system. The payload delivery system can lower a payload to the ground...
US-9,492,712 Swimming paddle and custom fitting method
A swimming paddle with an upper rounded swimcap-shaped edge terminating in side indentations that define cap-securing temples, and a central goggle-securing...
US-9,491,729 Connecting a circuit-switched wireless access network to an IP multimedia subsystem
A network device performs a delayed registration in connection with phone call setup, if the network device does not know a phone number of a user in question...
US-9,491,625 Access point apparatus for configuring multiple security tunnel, and system having the same and method thereof
A wireless access point apparatus for configuring a multiple data security tunnel, and a system having the same and a method thereof, and more particularly, a...
US-9,491,621 Systems and methods for fast initial link setup security optimizations for PSK and SAE security modes
Systems, methods, and devices for communicating data in a wireless communications network are described herein. In some aspects, an access point transmits a...
US-9,491,620 Enabling secure access to a discovered location server for a mobile device
A method for obtaining a secure connection between a first server and a client. The method may comprise establishing a secure communication session between a...
US-9,491,508 Methods and apparatus to detect carrying of a portable audience measurement device
Methods and apparatus to detect carrying of a portable audience measurement device are disclosed herein. An example portable audience measurement device...
US-9,491,199 Security, fraud detection, and fraud mitigation in device-assisted services systems
A device having: an application program that assists the device in accessing a data service over a wireless access network, an application credential associated...
US-9,491,196 Security for group addressed data packets in wireless networks
A wireless network includes a border router, multiple router nodes and end devices. All nodes of the wireless network use a same group key for encryption and...
US-9,491,186 Method and apparatus for providing hierarchical pattern recognition of communication network data
An approach for providing hierarchical pattern recognition of communication network data is described. A network security brain platform may process...
US-9,491,182 Methods and systems for secure internet access and services
A method and system for providing secure internet access and services are disclosed. The method includes receiving a request for services from a user terminal,...
US-9,491,178 Identifying a measure of online security
A computer-implemented method includes retrieving, by one or more processing devices and from one or more data repositories, user information; generating, based...
US-9,491,174 System and method for authenticating a user
A method for authenticating a user having a first enrollment step including: receiving by a first server an identifier and a password, and sending this...
US-9,491,168 Methods, systems, devices, and products for authenticating users
Enhanced biometric authentication combines a user's inherent biometric data with the user's password, code, or other secret glyph. For example, the user's...
US-9,491,149 Computer product, recording medium, communications apparatus, and communications method
Improvement of the security of communication is facilitated. A server receives from an on-vehicle device, encrypted data obtained by encrypting ECU information...
US-9,491,110 Method and device for securing data packets to be transmitted via an interface
A method for securing data packets to be transmitted via an interface includes determining a check number over at least a portion of a first data packet and at...
US-9,491,077 Network metric reporting system
A tool for monitoring the use of devices in an interconnected network. Desired network information, such as the use of browsers on the networked devices, the...
US-9,490,985 Systems and methods to secure user identification
A computing apparatus configured to verify a digital signature applied on a set of data received from a user device, including a user ID assigned by a partner...
US-9,490,977 Method and apparatus for enabling physical layer secret key generation
A method and apparatus for generating physical layer security keys is provided. Channel impulse response (CIR) measurements are recorded. Each CIR measurement...
US-9,490,972 Method and apparatus for providing conditional access based on channel characteristics
A first network device may discover one or more values of one or more parameters corresponding to a plurality of links and/or devices of the network. The first...
US-9,490,581 Connector insert assembly
Connector inserts having contacts with a high-impedance for good signal integrity and low insertion loss, a pleasant physical appearance, and that may be...
US-9,489,672 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-9,489,604 Optically variable data storage device
An optically variable device uses a data storage layer with a nano-optical bit system to store data. The optically variable device encodes the data using...
US-9,489,543 Supporting port security on power-over-Ethernet enabled ports
Embodiments of the present invention include systems and methods for controlling power delivery to a port in a power sourcing equipment. The power sourcing...
US-9,489,542 Split-key arrangement in a multi-device storage enclosure
Apparatus and method for data security in a multi-device data storage enclosure. In some embodiments, the storage enclosure has a housing with opposing first...
US-9,489,536 System and method for secure reciprocal exchange of data
A social media computer system and method for transmission of data between a first mobile phone and a second mobile phone includes a database that is configured...
US-9,489,534 Multi-level security system for enabling secure file sharing across multiple security levels and method thereof
A multi-level security system includes a storage medium partitionable into a plurality of partitions, a file system coupleable to the plurality of partitions,...
US-9,489,529 Data security system
Various exemplary embodiments relate to a method of identifying unauthorized access to a data file on an unauthorized machine. The method includes: modifying...
US-9,489,525 Secure storage system
A storage system includes a plurality of drives that write and read data to and from removable storage media communicatively connected to a storage controller....
US-9,489,505 Method for displaying information on a display device of a terminal
The invention relates to a method for displaying information on a display device (D1, D2) of a terminal, particularly a mobile terminal, wherein the terminal...
US-9,489,503 Behavioral stochastic authentication (BSA)
Methods and systems for authenticating a user and a consumer electronic device (CED) to a financial services provider (FSP) for purposes of communications...
US-9,489,496 Secure software updates
Improved techniques to update software in electronic devices that are already in use are disclosed. In one embodiment, software can be updated in a secure and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.