Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,590,973 Methods for fraud detection
Method and systems for validating a client user in a secured network are provided. Upon authentication, a user is supplied a login cookie that includes...
US-9,590,964 GPS-enabled cross-domain guard
A method for routing of information between networks of differing security levels may include, but is not limited to: receiving a data packet from a first...
US-9,590,959 Data security service
A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The...
US-9,590,957 Bluesalt security
Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data...
US-9,590,951 One-time pad communications network
A system and method for providing secure and anonymous communication between a plurality of individuals relying on the cryptographic method of the one-time pad...
US-9,590,923 Reliable link layer for control links between network controllers and switches
A method for transmission of control data between a network switch and a switch controller is provided. The method includes: configuring a plurality of control...
US-9,590,810 Device security
Methods for securing and activating chips and/or devices that can utilize a hardware security module (HSM). One or more of the methods can include generating...
US-9,590,352 Magnetically-implemented security devices
Security devices and methods of securely coupling electronic devices and peripherals are provided. In one embodiment, a peripheral has a first coded magnet on a...
US-9,589,447 Personal safety system, method, and apparatus
A personal safety system, method, and apparatus provides image, audio, and data capture and transport system (IADCTS) features wherein an electronic device...
US-9,589,441 Security system and method
A security control apparatus, system and method are provided. The security control apparatus includes a wireless communication element that supports a plurality...
US-9,589,401 Method for securely delivering indoor positioning data and applications
Methods and devices are described for providing localized secure navigation in conjunction with near field communication access control systems. In one...
US-9,589,262 Mobile checkout systems and methods
A mobile checkout system and method for completing a purchase transaction to purchase items from an internet merchant. A user browses and selects items for...
US-9,589,257 Electronic authorization system and method
An electronic authorization system comprising a data source system configured to transmit transaction data. A secure data system is coupled to the data source...
US-9,589,217 Augmenting barcodes with secondary encoding for anti-counterfeiting
A system generates a secure barcode by: identifying a primary pattern for a two-dimensional barcode to be printed on a substrate, wherein the primary pattern...
US-9,589,155 Technologies for verifying components
Technologies for verifying hardware components of a computing device include retrieving platform identification data of the computing device, wherein the...
US-9,589,153 Securing integrity and consistency of a cloud storage service with efficient client operations
A method for providing integrity and consistency of a cloud storage service to a group of mutually trusted clients may be provided. The cloud storage service...
US-9,589,148 Systems and methods for securing data in motion
The systems and methods of the present invention provide a solution that makes data provably secure and accessible--addressing data security at the bit...
US-9,589,144 System and method for cryptographic suite management
Systems and methods for cryptographic suite management are described. A system for cryptographic suite management has a cryptographic suite management unit...
US-9,589,140 Digital asset authentication system and method
The invention provides a digital asset authentication system and method. The invention includes a digital asset metadata register storing details of parties...
US-9,589,134 Remediation of security vulnerabilities in computer software
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each...
US-9,589,117 Computer security system and method
A computer security system comprises a security module adapted to control access to a secure computer resource by a user via a client based on verification of a...
US-9,589,062 Durable memento system
Durable memento system that enables the storage of data associated with mementos, which are objects that serve to provide a reminder of a person, place, thing,...
US-9,588,974 Method and system for applying data retention policies in a computing platform
Systems and methods for a multitenant computing platform. Original data is generated through operation of a computing platform system on behalf of an account of...
US-9,588,909 Information processing technique to manage security attributes of data generated in different modes
An information processing apparatus includes a storage managing unit configured to manage a storage device by dividing the storage device into a plurality of...
US-9,588,907 Initial operation of a portable data carrier
In a portable data carrier having a non-volatile memory, a memory controller and a memory interface, an effected initial operation of the data carrier is...
US-9,588,776 Processing device
Disclosed herein is a processing device comprising a secured execution environment comprising means for bringing the processing device into a predetermined...
US-9,588,094 Water monitoring system
An Anti-Terrorism water quality monitoring system for continuously monitoring a potable water treatment system and related potable water distribution network...
US-9,586,756 Weighing system for a front-end-loading waste-hauling vehicle
A weighing system for a waste-hauling vehicle having a front end loader with at least two arms for lifting a waste container, the weighing system comprising: an...
US-9,585,768 Acetabular cup prosthesis alignment system and method
Technologies for aligning an acetabular prosthetic component in a patient's surgically prepared acetabulum include a reference sensor module securable to the...
US-9,585,584 Physiological signal monitor with retractable wires
A physiological signal monitor having retractable wires may include a housing, a patch and a cradle. The housing may be adapted to carry a memory, a first...
US-9,585,013 Generation of multiple shared keys by user equipment and base station using key expansion multiplier
In one embodiment, multiple keys are generated in user equipment of a communication system based at least in part on a designated key expansion multiplier. A...
US-9,585,006 Express mobile device access provisioning methods, systems, and apparatus
Methods, systems, and apparatus enable provisioning of a mobile device with access information for an account. A secure element within a subscriber identity...
US-9,584,958 Mobile device, method for facilitating a transaction, computer program, article of manufacture
There is disclosed a mobile device comprising: a near field communication unit, a further communication unit being connected to the near field communication...
US-9,584,587 Managing transmission and storage of sensitive data
Systems and methods for injecting sensitive data into outgoing traffic that is to be sent to a remote server from a client by a network security appliance...
US-9,584,543 Method and system for web integrity validator
A computer-implemented method and system for the validation of a true browsing user on a website is disclosed. The invention allows for the collection of data...
US-9,584,533 Performance enhancements for finding top traffic patterns
A method for network traffic characterization is provided. Flow data records are acquired associated with a security alert signature. Unidimensional traffic...
US-9,584,509 Auditing and permission provisioning mechanisms in a distributed secure asset-management infrastructure
The embodiments described herein describe technologies for ticketing systems used in consumption and provisioning of data assets, such as a pre-computed (PCD)...
US-9,584,492 Cryptographic proxy service
A cryptographic proxy service may be provided. Upon determining that data associated with a network destination comprises at least some sensitive data, a...
US-9,584,491 Intelligent security analysis and enforcement for data transfer
An approach is provided for managing a message being transferred from a mobile device. A sensitivity level of data in the message payload is determined prior to...
US-9,584,488 Data encryption cipher using rotating ports
A streaming one time pad cipher using rotating ports for data encryption uses a One Time Pad (OTP) to establish multiple secure point-to-point connections. This...
US-9,584,486 Communication system, wireless communication apparatus, and communication method
A wireless communication circuit includes a receiver to receive at least one of a beacon frame and a probe response frame from a first wireless communication...
US-9,584,481 Host providing system and communication control method
A host providing system includes a physical host network switch which determines permission and non-permission of communication on the basis of whether or not...
US-9,584,480 System for and method of securing a network utilizing credentials
A system for and method of securing a network are described herein. A receiving device listens for packets with proper credentials. If a transmitting device...
US-9,584,475 System and method for optical security firewalls in computer communication systems
There is a method and system for a bidirectional firewall in computer communications, which utilizes the transfer of information from an optical display to a...
US-9,584,327 System and method for authentication for transceivers
A method and apparatus of a network element that authenticates a transceiver and/or a field replaceable unit of the network element is described. The network...
US-9,584,321 Secure storage for shared documents
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption...
US-9,584,317 Identifying security boundaries on computing devices
During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a...
US-9,584,314 Event-driven, asset-centric key management in a smart grid
A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event...
US-9,584,311 Decrypting data
A device for decrypting data includes a number of devices secured by at least one security device. The secured devices include a receiver for receiving...
US-9,583,008 Managing data exchange between an avionic core and an open world device
A flight management system includes: an avionics core implementing generic aircraft management functionalities and providing services associated with the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.