Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,578,059 Policy enforcement in a secure data file delivery system
A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server...
US-9,577,992 Data encryption/decryption using neuro and neuro-mechanical fingerprints
In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to...
US-9,577,988 Data encryption, transport, and storage service for carrier-grade networks
A method, a system, and a non-transitory storage medium for storing user preferences pertaining to a data encryption service that provides on-demand encryption...
US-9,577,987 Digital broadcast methods using secure meshes and wavelets
Methods and apparatuses are presented for securely providing digital streaming data to subscriber devices using encrypted wavelet meshes. A recorded image may...
US-9,577,986 Secure data verification technique
A technique for the secure exchange and verification of data between multiple entities that use compatible business management systems utilizes serializable...
US-9,577,831 Relational encryption
A method includes receiving biometric data, the biometric data non-uniformly distributed and processing the biometric data to a level of randomness as a...
US-9,577,822 Secure bitstream authentication
Methods and systems are provided for securely authenticating data of an integrated circuit. By authenticating data having keystream blocks inserted between...
US-9,577,743 Communications system having a secure credentials storage device
The invention relates to a communication system comprising a terminal (10), a first device (1) adapted to exchange data with said terminal (10), a second device...
US-9,577,641 Spin transfer torque based memory elements for programmable device arrays
Disclosed herein are semiconductor device arrays, such as, Field Programmable Gate Arrays (FPGAs) and Complex Programmable Logic Arrays (CPLAs) that use...
US-9,577,374 Textile connector for an electronic textile having a snap fastener with contacts
A textile connector for an electronic textile includes a snap fastener having first and second snap segments configured to be snap fastened together such that...
US-9,576,491 School child tracking system
A system for tracking school buses and school children to enhance the security and safety of schoolchildren and provide real-time information about the location...
US-9,576,469 Systems and methods of adaptively adjusting a sensor of a security system
Embodiments of the disclosed subject matter provide systems and methods of adaptively adjusting sensitivity of a sensor of a security system that provide a...
US-9,576,425 Portable intermediary trusted device
In one embodiment, an intermediary gaming trusted electronic device for use with an untrusted PED may include a position sensor configured to acquire position...
US-9,576,286 Consumer device based point-of-sale
Systems and related methods facilitating interactions between a merchant device, a central system and a consumer device are discussed herein. Wallet identifying...
US-9,576,246 Predictive modeling and data analysis in a secure shared system
A system and method enables users to selectively expose and optionally monetize their data resources, for example on a web site. Data assets such as datasets...
US-9,576,160 Card reader
A card reader may include a card insertion part which is formed with an insertion port into which the card is inserted; and a magnetic sensor which is provided...
US-9,576,156 Download security system
A download security system (100) includes a server (102) and an information processing apparatus (10). The information processing apparatus (10) includes a...
US-9,576,147 Security policy application through data tagging
Techniques are described for applying data usage policies through data tagging. A metadata tag may be applied to data to indicate a type of the data. In some...
US-9,576,144 Secured file system management
Systems and methods for accessing data secured and encrypted using a file system manager are disclosed. One method includes determining whether a community of...
US-9,576,137 Method and system for analyzing integrity of encrypted data in electronic control system for motor vehicle
A method for improving the functional security and increasing the availability of an electronic control system, particularly a motor vehicle control system,...
US-9,576,122 System and method for secure data entry
An electronic device comprises a CPU, and a touch-sensitive screen operable to display a plurality of keys. Each of the plurality of keys are associated with...
US-9,575,926 System and method for optimizing secured internet small computer system interface storage area networks
A network device includes a port coupled to a device, another port coupled to another device, and an access control list with an access control entry that...
US-9,575,906 Method and system for process working set isolation
Embodiments of systems and methods disclosed herein may isolate the working set of a process such that the data of the working set is inaccessible to other...
US-9,575,904 Memory data security
A memory module secures data stored on the memory module. A request for the data from a computer system is received by the memory module. A verification key...
US-9,575,903 Security perimeter
Embodiments of memory devices, computer systems, security apparatus, data handling systems, and the like, and associated methods facilitate security in a system...
US-9,575,824 Systems and methods of secure domain isolation involving separation kernel features
Systems and methods are disclosed for providing secure information processing. In one exemplary implementation, there is provided a method of secure domain...
US-9,575,790 Secure communication using a trusted virtual machine
A client system, such as a computer or a smartphone, securely exchanges sensitive information with a remote service provider computer system such as a bank or...
US-9,575,728 Random number generation security
A technique for improving random number generation (RNG) security for a data processing system includes a storage subsystem of a processing unit receiving a...
US-9,572,503 Personal safety and security mobile application responsive to changes in heart rate
A software app for a mobile device is disclosed for alerting a custodian of a person to be protected of an emergency situation involving the person to be...
US-9,572,274 Securing mechanism
A securing mechanism is configured to secure an electronic device. The electronic device includes a body, a power adapter and a first data cable connecting the...
US-9,572,016 Methods and apparatus for use in transferring an assignment of a secure chip between subscription managers
Techniques for use in transferring an assignment of a secure chip of a wireless device from a current subscription manager (SM) of a current mobile network...
US-9,572,014 Service provider activation with subscriber identity module policy
Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently...
US-9,571,516 Cloud service usage monitoring system
A cloud service usage assessment system analyzes network traffic from an enterprise data network and generates cloud service usage analytics for the enterprise....
US-9,571,515 Notification of security question compromise level based on social network interactions
An approach is provided to improve security of security questions. In the approach, the system prompts a user for a security question. The security question and...
US-9,571,514 Notification of security question compromise level based on social network interactions
An approach is provided to improve security of security questions. In the approach, the system prompts a user for a security question. The security question and...
US-9,571,510 Systems and methods for identifying security threat sources responsible for security events
The disclosed computer-implemented method for identifying security threat sources responsible for security events may include (1) identifying security-event...
US-9,571,506 Dynamic enterprise security control based on user risk factors
Aspects dynamically set enterprise-level security rules. Risk values representing likelihoods of loss of enterprise secure data are determined for different...
US-9,571,499 Apparatus and method of providing security to cloud data to prevent unauthorized access
A method and apparatus for providing security of an electronic apparatus are provided. The method includes identifying an environment of a client to be provided...
US-9,571,465 Security verification by message interception and modification
Data security is enhanced by injecting insecurity into communications between two computer systems to test one of the computer systems. The insecurity is...
US-9,571,455 Remote credential management for hybrid clouds with enterprise networks
A system and method of initializing a virtual machine within a secure hybrid cloud is disclosed. One method includes transmitting service mode credentials to a...
US-9,571,454 Dynamic re-ordering of scanning modules in security devices
A method and apparatus are provided for preserving bandwidth of a security gateway by dynamically placing a module with a highest ratio of block rate to...
US-9,571,453 Kernel-level security agent
A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using...
US-9,571,287 Secure proofs of storage for deduplication
Storage providers can securely store data and avoid data duplication with secure derivative data and offload the responsibility of generating the secure...
US-9,571,283 Enabling packet handling information in the clear for MACSEC protected frames
Techniques are provided to append packet handling information "in the clear" ahead of security related information in a packet to be routed over a network to...
US-9,571,270 Construction and uses of variable-input-length tweakable ciphers
Innovations in the construction and use of variable-input-length tweakable ciphers ("VILTCs"). In some cases, a VILTC uses an initialization vector that is...
US-9,570,193 Implementing hidden security key in eFuses
A method and circuit for implementing a hidden security key in Electronic Fuses (eFuses), and a design structure on which the subject circuit resides are...
US-9,569,966 Bicycle tracking system with communication hub
A bicycle tracking system for a bicycle rental system includes a number of bicycles each including a bicycle computer configured to record and transmit trip...
US-9,569,937 Tactile touch screen
A machine (10) is operative to carry out financial transfers responsive to data included on data bearing records including user cards. The machine includes a...
US-9,569,669 Centralized video surveillance data in head mounted device
An apparatus includes a security location module that tracks a location of a user. The user has a heads-up display with a display that allows viewing by the...
US-9,569,642 Always-available embedded theft reaction subsystem
A system comprising a platform protected by an always-on always-available security system is described. In one embodiment, the system includes a risk behavior...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.