Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,537,883 Process security validation
Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first...
US-9,537,882 Methods, systems, and devices for detecting and isolating device posing security threat
Methods and systems are disclosed for detecting a security threat. The methods and systems comprise detecting that a first device is coupled with the first I/O...
US-9,537,879 Cyber security monitoring system and method for data center components
A security monitoring system is disclosed which is adapted for use with a component having a service processor. The system may use a device configured to...
US-9,537,863 Data driven role based security
Data driven role based security is provided. At login, the system queries for a data context in connection with access to computing objects of a computing...
US-9,537,855 Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
US-9,537,848 Application security system and method
According to an aspect, a computing device includes a processor; a computer readable memory; a display screen; a touch sensitive panel overlying the display...
US-9,537,835 Secure mobile app connection bus
A secure mobile application connection bus is disclosed. First encryption information and an identifier associated with a data storage location on a mobile...
US-9,537,828 Secure mobile communication relay having firewall function
The secure mobile communication relay of the present invention may comprise: a baseband processing unit for the baseband modulation/demodulation of the mobile...
US-9,537,825 Geographic filter for regulating inbound and outbound network communications
A system and method for regulating and analyzing inbound and outbound communications in and between computer networks on the basis of geographic security...
US-9,537,656 Systems and methods for managing cryptographic keys in a secure microcontroller
The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and...
US-9,537,654 Biometric validation method and biometric terminal
The present invention belongs to the field of Biometry. It discloses useful technology and equipment to make remote processes of fingerprint recognition and...
US-9,536,362 Polarized images for security
One embodiment may take the form of a method for providing security for access to a goal including storing a first image and receiving a second image comprising...
US-9,536,234 Road toll system
A road toll system comprises a vehicle-mounted unit having a satellite navigation receiver. A first data processing means determines a route taken 5 based on...
US-9,536,116 Active component embedded in cable
Examples disclose a cable to secure data transmission. Examples of the cable include a connector to connect to a computing device for data transmission....
US-9,536,113 Information processing apparatus, information processing system, and computer program product
According to an embodiment, an information processing apparatus includes a main processor, a secure operating system (OS) module, a non-secure OS module, a...
US-9,536,110 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-9,536,109 Method and system for administering a secure data repository
A method, system and computer program product for administering a secure data repository. Rather than using a specific database, an application may use an...
US-9,536,103 Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
US-9,536,101 System and method for controlling access to data using API for users with disabilities
Disclosed are systems and methods for controlling access to data on mobile devices using an accessibility API for users with disabilities. An exemplary method...
US-9,536,095 System for booting and dumping a confidential image on a trusted computer system
A computer system for booting a confidential image on a trusted computer system. A trusted computer system loads an encrypted client image key onto a protected...
US-9,536,094 Mediated secure boot for single or multicore processors
A system and methods are disclosed for securely booting a processing system using a three step secure booting process. Several embodiments are presented,...
US-9,536,083 Securing data on untrusted devices
One example method for securing data on untrusted devices includes the steps of identifying, by a first process, a command in a command queue, the command from...
US-9,536,079 Safely executing an untrusted native code module on a computing device
A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of...
US-9,536,078 Integrated circuit for cyber security processing
In one aspect, an integrated circuit (IC) includes a secure router configured as a trust anchor, a non-volatile random access memory (RAM) direct memory access...
US-9,536,055 Cabinet system
A cabinet system for securely storing items includes a cabinet housing, a controller, and at least one drawer unit. The cabinet housing has a locking mechanism,...
US-9,535,852 System and method for secured host-slave communication
Slave device circuitry, including processing circuitry which is configured to determine a new session identification value; determine a seed value using a...
US-9,535,828 Leveraging non-volatile memory for persisting data
Data temporarily stored in volatile memory (e.g., RAM) on a host machine can be protected using a component such as an NV-DIMM, which includes components such...
US-9,535,712 System and method to store data securely for firmware using read-protected storage
Embodiments of the present invention store data in read-protected storage for use by firmware and then transfer the data or data related to that stored data...
US-9,535,563 Internet appliance system and method
An Internet appliance, comprising, within a single housing, packet data network interfaces, adapted for communicating with the Internet and a local area...
US-9,535,031 Molecular receptor-based chemical field-effect transistor (CHEMFET) devices, systems, and methods for in-situ...
Embodiments include a method for securing a membrane material to a gate of a molecular receptor-based chemical field-effect transistor (CHEMFET). The method can...
US-9,532,220 Apparatus and method for authentication in wireless communication system
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data...
US-9,532,215 Secure deployment of terminals in a wireless network
A method for securely deploying a communication device in a communication network, the method comprising: storing a device identity and an associated token in...
US-9,532,197 DID line type provisioning verification
A messaging hub provides communication services for user devices associated with an enterprise office telephone number. The messaging hub establishes a secure...
US-9,532,168 Transaction based temporary and secure access
A system includes a location tracking services server (LTSS) in communication with a location owner device. A tracking packet is sent from the location owner...
US-9,532,166 Transaction based temporary and secure access
A system includes a location tracking services server (LTSS) in communication with a location owner device. A tracking packet is sent from the location owner...
US-9,532,014 Information processing system and method, information processing apparatus, image-capturing device and method,...
A feature extracting unit obtains sensor data from a plurality of sensors to calculate each feature. When an event determining unit determines the occurrence of...
US-9,531,776 Multimedia communication control unit as a secure device for multimedia communication between LAN users and...
A system and method for providing multimedia communication between a firewall protected, LAN based endpoint and an endpoint that is external to the LAN. A...
US-9,531,759 Generating accurate preemptive security device policy tuning recommendations
An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a...
US-9,531,745 Crowd-sourced security analysis
A cloud-based static analysis security tool that is accessible by a set of application development environments is augmented to provide for anonymous knowledge...
US-9,531,741 Controlling a computer system
A method and apparatus for control of a computer system are disclosed. The computer system includes a terminal for operator based monitoring of the computer...
US-9,531,738 Cyber security adaptive analytics threat monitoring system and method
A system and method of detecting command and control behavior of malware on a client computer is disclosed. One or more DNS messages are monitored from one or...
US-9,531,737 Method and vehicle-to-X communication system for selectively checking data security sequences of received...
A method for selectively checking data security sequences of received vehicle-to-X messages, in which a number of the vehicle-to-X messages are received and/or...
US-9,531,717 Method of securing access to data or services that are accessible via a device implementing the method and...
The invention allows to secure access to data or services that are available for devices and applications via a device implementing the method. In order to...
US-9,531,704 Efficient network layer for IPv6 protocol
An electronic device may include a network interface that may enable the electronic device to wirelessly couple the electronic device to other electronic...
US-9,531,699 Electronic protected health information security for digital medical treatment room
A medical imaging system includes a data store having stored medical imaging data and a computer. The system may be in a medical treatment room and is adapted...
US-9,531,683 Secure connection between a data repository and an intelligence application
Embodiments of the invention are directed to systems, methods and computer program products for establishing a secure connection between a data repository and...
US-9,531,681 Method for the authentication of applications
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a...
US-9,531,680 Method and apparatus for secure data transmissions
An apparatus, system, and method are disclosed for secure data transmissions. In one embodiment, a method includes receiving a request for data from a remote...
US-9,531,679 Content-based transport security for distributed producers
A content-producing computer system can use a locally generated key or a client-generated key to communicate with a client device during a session over a...
US-9,531,672 Network device implementing two-stage flow information aggregation
A network security device includes a network flow statistics processing engine to process network flow information related to network flows. The network flow...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.