Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,445,267 Bump or close proximity triggered wireless technology
Techniques for performing various communications functionality based on detecting a bump condition and/or close proximity between wireless devices. A wireless...
US-9,445,266 Smart plug or cradle
There is provided a method and apparatus for allowing a user of a mobile device to securely access a storage device of a home network of the user. The method...
US-9,445,263 Method for ensuring security and privacy in a wireless cognitive network
In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management...
US-9,445,112 Secure transcoding of video data
A secure transcoder assembly features a secure data path where the related crypting and coding functions are secured in the secure data path. More specifically,...
US-9,444,866 Network condition predictions for multimedia streaming
Network condition prediction and multimedia streaming consumption prediction are provided. The prediction may be based on a device's prior location, behavior,...
US-9,444,829 Systems and methods for protecting computing resources based on logical data models
A computer-implemented method for protecting computing resources based on logical data models may include (1) receiving, from a security agent, log data that...
US-9,444,827 Multi-function, modular system for network security, secure communication, and malware protection
Representative embodiments are disclosed for providing network and system security. A representative apparatus includes an input-output connector coupleable to...
US-9,444,824 Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial...
Disclosed are methods, systems, and articles of manufacture for implementing adaptive levels of authentication assurance according to sensitivity or criticality...
US-9,444,823 Method and apparatus for providing network communication association information to applications and services
A system and method are provided that allow an application on a first terminal to inquire about available network communication associations that it can use to...
US-9,444,820 Providing context-based visibility of cloud resources in a multi-tenant environment
A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a...
US-9,444,819 Providing context-based visibility of cloud resources in a multi-tenant environment
A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a...
US-9,444,818 Method and system for automatically managing secure communications in multiple communications jurisdiction zones
Communications and data security policy data for two or more communications jurisdiction zones is obtained that includes data indicating allowed protocols for...
US-9,444,793 System, apparatus and method for encryption and decryption of data transmitted over a network
A method and system for securing data transmitted between a client device and a server by obtaining input text at an intermediate module, processing the input...
US-9,444,788 Data leak protection in upper layer protocols
Methods and systems for Data Leak Prevention (DLP) in a private network are provided. A data structure is maintained within a network security appliance...
US-9,444,764 Scalable and secure interconnectivity in server cluster environments
A computer implemented method may manage network resources within a server cluster. The server cluster may include any number or switches and servers connected...
US-9,444,716 Secure cloud management agent
A method for providing a secure management agent for high-availability continuity for cloud systems includes receiving operating parameters and threshold...
US-9,444,645 Method and device for assessing a probative value of electronic document management systems
A method for securing data assessing a probative value of document transfers. The identity of a recipient of a document is authenticated. The document is...
US-9,444,639 Multi-tier wireless home mesh network with a secure network discovery protocol
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
US-9,444,629 Dual layer transport security configuration
A system includes a first computer processor that receives a data transmission from a second computer processor. The data transmission includes a client...
US-9,443,550 Data storage system providing efficient and secure data migration with tape drive technology
A data storage system that includes a data migration assembly implemented using tape drive technology. The migration assembly includes tape drive modules or...
US-9,443,481 LCD driver IC
A liquid crystal display driver IC includes a plurality of communication interface circuits, a plurality of driving circuits which drive a plurality of source...
US-9,443,370 Method and apparatus for onsite distribution of medications and medical supplies
Secure access distribution machines and methods for distributing a plurality of medical items to an authorized user. The distribution machine includes a housing...
US-9,443,112 Secure media container
Embodiments of a secure media container and a method of using same are provided. In some embodiments, the secure media container includes a portable power...
US-9,443,111 Device security using an encrypted keystore data structure
Apparatus and method for data security through the use of an encrypted keystore data structure. In accordance with some embodiments, first and second sets of...
US-9,443,108 Secure timestamping
A method and system for retrieving a current and previous timestamp value, retrieving a previous accumulator value reflecting a previous state of the...
US-9,443,106 Filtering means for tracking information flow in android operated devices
Security features of an ANDROID.RTM. operating system device using a data flow tracking filter are described. The data flow tracking filter uses a message...
US-9,443,104 Tokenization of structured data
Structured data, such as email addresses, social security numbers, and the like is accessed for encoding. A set of encoding rules including one or more encoding...
US-9,443,100 Security mechanism for increased personal data protection
Apparatus, systems, and methods provide a mechanism to enhance the management of data security in a system for users of the systems. Various embodiments include...
US-9,443,099 Method and apparatus for accessing secure data in a dispersed storage system
A method begins with a first computing device receiving a first request from a user device to access secure data. The method continues with the first computing...
US-9,443,097 Systems and methods for securing data in motion
The systems and methods of the present invention provide a solution that makes data provably secure and accessible--addressing data security at the bit...
US-9,443,092 System and method for matching data sets while maintaining privacy of each data set
A system and method that allows two parties to find common records in their data sets without having to actually share the data sets with each other or a third...
US-9,443,067 System for the distribution and deployment of applications, with provisions for security and policy conformance
A system and method are disclosed for deploying applications to end point devices. The applications are obtained from a marketplace that checks the applications...
US-9,442,467 Event triggered data lockbox capable of anonymous revelation
An event triggered data lockbox is capable of anonymous revelation. The personal information for a person is saved in a secure memory. A lockbox condition for...
US-9,439,322 Modular data center deployment method and system for waterborne data center vessels
A modular data center build method and system including pre fabricated data center modules comprised of a plurality of racks, a plurality of rack mounted...
US-9,439,143 Method and device for power saving mode control in mobile communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-9,439,056 Secure sharing of device voice and data services with fee based policies
Methods and systems may provide for conducting an authentication of an external card associated with a borrower of a device, and tracking a usage of the device...
US-9,438,865 Systems and methods for automated cloud-based analytics for security surveillance systems with mobile input...
Systems and methods for cloud-based surveillance for a target surveillance area are disclosed. At least two input capture devices and at least one user device...
US-9,438,696 Data communication protocol
Described is a data communication protocol, in which a client and server negotiate in a manner that does not require the client to retry negotiation when...
US-9,438,667 Method and system for fast access to advanced visualization of medical scans using a dedicated web portal
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized...
US-9,438,662 Enabling secure remote assistance using a terminal services gateway
A secure remote assistance session between computers that are behind firewalls and/or NAT devices is provided by an arrangement that uses a terminal services...
US-9,438,634 Microsegmented networks that implement vulnerability scanning
Systems for providing vulnerability scanning within distributed microservices are provided herein. In some embodiments, a system includes a plurality of...
US-9,438,629 Sensitive information leakage prevention system, sensitive information leakage prevention method, and...
A client device (100) determines whether or not access is allowed, based on security levels that are set for an application program and data held in a server...
US-9,438,627 Shared security utility appliance for secure application and data processing
A security information technology element (ITE) is disclosed for secure application and data processing, the security ITE including a physical enclosure...
US-9,438,615 Security risk management
Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the...
US-9,438,612 Calculating consecutive matches using parallel computing
Methods and systems for determining consecutive matches are provided. According to one embodiment, a class definition and a data stream are received by a...
US-9,438,594 Method and apparatus for establishing tunnel data security channel
Sending an authentication request message to an authentication device, receiving an authentication response message sent by the authentication device, where the...
US-9,438,569 Secured embedded data encryption systems
Devices generate security vectors based on their own attributes. A device's security vectors compose its transformation matrix. The devices securely share...
US-9,438,562 Network security module for Ethernet-receiving industrial control devices
A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The...
US-9,438,560 Systems and methods for automatically applying firewall policies within data center applications
The disclosed method may include (1) identifying a data center application whose functionality is provided by a set of systems, (2) organizing, automatically by...
US-9,438,547 Uniform policy for security and information protection
System and methods for the implementation and/or enforcement of an email policy for an organization's email system are presented. A Data Loss Prevention (DLP)...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.