Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,961,057 Securing a cryptographic device against implementation attacks
Methods of securing a cryptographic device against implementation attacks, are described. A disclosed method comprises the steps of obtaining a key (230) from...
US-9,961,055 Inaccessibility of data to server involved in secure communication
A client negotiates multiple cryptographic keys with a server. One of the cryptographic keys is used to encrypt communications that the server can decrypt....
US-9,961,048 System and associated software for providing advanced data protections in a defense-in-depth system by...
The advanced data protection system is implemented by distributing encrypted data across multiple isolated computing systems and using multi-factor...
US-9,961,047 Network security management
Methods and apparatus are disclosed for processing status messages for use in network security management in respect of a network of computing devices, the...
US-9,960,921 Systems and methods for securely provisioning the geographic location of physical infrastructure elements in...
Systems and methods relating to improved security in cloud computing environments are disclosed. According to one illustrative implementation, a method for...
US-9,960,919 Method for providing security using secure computation
A method of securing data, the method comprising: dividing a secret key into a plurality of secret key shares; storing each of the plurality of secret key...
US-9,960,916 Secure telemetric link
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and...
US-9,960,911 System and method for securing wireless communication through physical layer control and data channel
A system for securing wireless communication between a transmitter and a receiver through a physical layer control and a data channel is disclosed. The...
US-9,959,777 Secure testing device, system and method
Headpiece (10) including a frame (22) having a support portion supported on a test-taker's head, an imaging device (14) that obtains images of an environment...
US-9,959,717 Security and first-responder emergency lighting system
A network system in a building complex linking different locations together and facilitating information and data exchange and access, includes `N` number of...
US-9,959,544 Updating an application on a smart card and displaying an advertisement
A method and apparatus for linking an application service provider to a chipholder during a post issuance operation involving the chipholder. The method and...
US-9,959,540 Security authentication using payment card display devices at accepted merchant locations
There are provided systems and methods for security authentication using payment card display devices at accepted merchant location. A user may be walking near...
US-9,959,528 System for handling network transactions
A method of securing a transaction that comprises a trust entity computer in communication with data storage, a first party and a second party over a network,...
US-9,959,464 Mobile device utilizing multiple cameras for environmental detection
A mobile electronic device may have two or more rear facing camera to capture a first part of an environment, a second part of the environment, and a part of an...
US-9,959,425 Method and system of privacy protection in antagonistic social milieu/dark privacy spots
An efficient and robust system 100 of privacy protection to provide security of a computing device by identifying and detecting unauthorized intrusion/peek...
US-9,959,423 Security and data isolation for tenants in a business data system
A multi-tenant hosting system receives business data and tenant-identifying data, from a tenant. The data from multiple different tenants is stored on a single...
US-9,959,418 Supporting configurable security levels for memory address ranges
A processor implementing techniques for supporting configurable security levels for memory address ranges is disclosed. In one embodiment, the processor...
US-9,959,417 Methods and systems for preventing transmission of sensitive data from a remote computer device
A technique for preventing selected sets of data words from unauthorized transmission out of the secure perimeter of a computer system is disclosed. A set of...
US-9,959,415 Methods and systems for accessing data from different security domains
Methods and apparatus for use in presenting information from a plurality of security domains. A first request for first data from a first data source and a...
US-9,959,413 Security and data privacy for lighting sensory networks
In one example, a method of protecting customer data in a networked system comprises collecting sensor data available at sensor nodes within a sensor network in...
US-9,959,405 Sandboxing third party components
A method and apparatus of a device for security management by sandboxing third-party components is described. The device can determine whether a third-party...
US-9,959,127 Systems and methods for exporting diagnostic data and securing privileges in a service operating system
Systems and methods for exporting failure and diagnostic data and securing privileges in a service Operating System (OS). In some embodiments, an Information...
US-9,955,912 Magnet-based monitoring system
A magnetometer-based monitoring system comprising a magnet integrated with an object whose disposition is to be monitored, a first magnetometer secured in...
US-9,955,885 System and method for physiological data processing and delivery
A system and method for secure physiological data processing and delivery are provided. A log of identifiers of physiological monitoring patches and of...
US-9,955,354 Apparatus and method for controlling security mode in wireless communication system
Disclosed is a method for controlling a security mode by a user equipment (UE) in a wireless communication system, including performing a camp-on process and a...
US-9,955,351 RFID phone-unlocking system
The RFID phone-unlocking system is adapted for use with a personal data device. The personal data device further comprises an interrogator, a security code, and...
US-9,955,239 Configurable secure mobile tool for AMI and AMR metering systems
Disclosed herein are apparatuses, methods and systems for a configurable and secure mobile tool for Advanced Metering Infrastructure (AMI) and Automatic Meter...
US-9,954,920 Distributed secure decoding and processing of big data streams
Embodiments are directed to a secure MapReduce model for distributed processing and decoding of big data streams. An encoding engine may be employed to divide a...
US-9,954,903 Industrial network security translator
Embodiments of the present technology relate to a system for providing intrusion detection for industrial control systems, comprising serial data links to...
US-9,954,902 Secure proxy
Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy...
US-9,954,899 Applying a network traffic policy to an application session
Embodiments of the present technology relate to a method for applying a security policy to an application session, comprising: determining, by a security...
US-9,954,856 Token based one-time password security
A one-time password (OTP) based security scheme is described, where a provider pre-generates a number of verification codes (e.g., OTP codes) which will be...
US-9,954,849 Systems and methods for managing secure sharing of online advertising data
Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary...
US-9,954,838 Browser plug-in for secure credential submission
Described is a technology by which a plug-in (e.g., an ActiveX.RTM. control) instantiated by a web browser calls functions of a credential service to use a set...
US-9,954,833 Management of access sessions
Disclosed are examples of managing access sessions for a computing device. In some examples, a computing device obtains a key and timeout data from secured...
US-9,954,832 System and method for enhanced data protection
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key...
US-9,954,826 Scalable and secure key management for cryptographic data processing
A method and system for secure and scalable key management for cryptographic processing of data is described herein. A method of secure key handling and...
US-9,954,740 Performance and security management of applications deployed in hosted computing environments
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing...
US-9,954,684 Secure sharing
Among other things, at a central server, management of a document sharing process includes uploading from client devices through a communication network,...
US-9,954,678 Content-based transport security
A computer system can send a secure request over a named-data network to a remote device by generating an Interest with encrypted name components. During...
US-9,954,579 Smart connectors and associated communications links
"Smart" connectors with embedded processors, measurement circuits and control circuits are disclosed for establishing a "contactless" radio frequency (RF)...
US-9,954,156 Body heat powered wireless transmitter
A Body Heat Powered Portable Wireless Transmitter contains a Thermo Electric Generator, an energy Harvesting System, a Control System and a Wireless...
US-9,953,720 Implementing hidden security key in eFuses
A method and circuit for implementing a hidden security key in Electronic Fuses (eFuses), and a design structure on which the subject circuit resides are...
US-9,953,543 Secured computer based assessment
Systems and methods for secured computer based assessment are described. In one embodiment, the method comprises capturing of proctoring data at a candidate...
US-9,953,530 Systems, methods, and devices for securing cargo
Enhanced methods and systems for securing and monitoring cargo are described. Some examples provide a cargo monitoring system ("CMS") that is configured to...
US-9,953,515 Inductive security sensor not susceptible to magnetic tampering
An inductive security sensor system is not susceptible to magnetic tampering (such as by using an external magnet or false target). A sensor assembly includes...
US-9,953,500 Methods, systems, and products for security services
A sensor associated with a security system determines an electrically open circuit. An identifier identifies the open circuit, which may then be used to...
US-9,953,497 Merchandise security system with data collection features and relevant technical field
A merchandise security system with data collection features and a relevant method are disclosed. The system has: a data management unit, at least one alarm unit...
US-9,953,479 Controlling access to physical compartment using mobile device and transaction authentication system
Techniques are disclosed relating to securing physical compartments and allowing users access via a mobile device configured to use a mobile authentication...
US-9,953,467 Secure vehicular data management with enhanced privacy
The present disclosure is directed to secure vehicular data management with enhanced privacy. A vehicle may comprise at least a vehicular control architecture...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.