Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,491,149 Computer product, recording medium, communications apparatus, and communications method
Improvement of the security of communication is facilitated. A server receives from an on-vehicle device, encrypted data obtained by encrypting ECU information...
US-9,491,110 Method and device for securing data packets to be transmitted via an interface
A method for securing data packets to be transmitted via an interface includes determining a check number over at least a portion of a first data packet and at...
US-9,491,077 Network metric reporting system
A tool for monitoring the use of devices in an interconnected network. Desired network information, such as the use of browsers on the networked devices, the...
US-9,490,985 Systems and methods to secure user identification
A computing apparatus configured to verify a digital signature applied on a set of data received from a user device, including a user ID assigned by a partner...
US-9,490,977 Method and apparatus for enabling physical layer secret key generation
A method and apparatus for generating physical layer security keys is provided. Channel impulse response (CIR) measurements are recorded. Each CIR measurement...
US-9,490,972 Method and apparatus for providing conditional access based on channel characteristics
A first network device may discover one or more values of one or more parameters corresponding to a plurality of links and/or devices of the network. The first...
US-9,490,581 Connector insert assembly
Connector inserts having contacts with a high-impedance for good signal integrity and low insertion loss, a pleasant physical appearance, and that may be...
US-9,489,672 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-9,489,604 Optically variable data storage device
An optically variable device uses a data storage layer with a nano-optical bit system to store data. The optically variable device encodes the data using...
US-9,489,543 Supporting port security on power-over-Ethernet enabled ports
Embodiments of the present invention include systems and methods for controlling power delivery to a port in a power sourcing equipment. The power sourcing...
US-9,489,542 Split-key arrangement in a multi-device storage enclosure
Apparatus and method for data security in a multi-device data storage enclosure. In some embodiments, the storage enclosure has a housing with opposing first...
US-9,489,536 System and method for secure reciprocal exchange of data
A social media computer system and method for transmission of data between a first mobile phone and a second mobile phone includes a database that is configured...
US-9,489,534 Multi-level security system for enabling secure file sharing across multiple security levels and method thereof
A multi-level security system includes a storage medium partitionable into a plurality of partitions, a file system coupleable to the plurality of partitions,...
US-9,489,529 Data security system
Various exemplary embodiments relate to a method of identifying unauthorized access to a data file on an unauthorized machine. The method includes: modifying...
US-9,489,525 Secure storage system
A storage system includes a plurality of drives that write and read data to and from removable storage media communicatively connected to a storage controller....
US-9,489,505 Method for displaying information on a display device of a terminal
The invention relates to a method for displaying information on a display device (D1, D2) of a terminal, particularly a mobile terminal, wherein the terminal...
US-9,489,503 Behavioral stochastic authentication (BSA)
Methods and systems for authenticating a user and a consumer electronic device (CED) to a financial services provider (FSP) for purposes of communications...
US-9,489,496 Secure software updates
Improved techniques to update software in electronic devices that are already in use are disclosed. In one embodiment, software can be updated in a secure and...
US-9,489,158 Print logging for use with terminal emulators
Print control and print logging may be performed using a web service and a terminal emulator. This may enable a business using an enterprise business...
US-9,485,804 High-speed WAN to wireless LAN gateway
A gateway interconnecting a high speed Wide Area Network (WAN) and a lower speed Wireless Local Area Network (WLAN) is provided. The high speed WAN is...
US-9,485,776 Method for operating multi-type beacons
Methods and apparatuses are provided for operating multi-type beacons by a first terminal connected with a second terminal through wireless communication. The...
US-9,485,477 Security system including modular ring housing
A modular building system arrangement includes a plurality of electrical building systems. Each electrical building system has a housing with a mechanical...
US-9,485,376 Print control apparatus, print control method, and program therefor
Conventionally, during a copy operation, certain advanced mode settings make the extraction of additional security information impossible. In order to solve...
US-9,485,277 Wide area network access management computer
A system and method for connecting a classified internet protocol (IP) network to a public IP network including an unclassified computing device. The...
US-9,485,259 System and architecture for electronic permissions and security policies for resources in a data system
An electronic permissions and security system are disclosed which may be used to determine permissions and policies for resources in a complex multi-dimensional...
US-9,485,254 Method and system for authenticating a security device
Methods for authenticating a security device at a local network location for providing a secure access from the local network location to a remote network...
US-9,485,253 Familiar dynamic human challenge response test content
Embodiments of the invention are directed to human challenge response test delivery systems and methods. Specifically, embodiments of the present invention are...
US-9,485,250 Authority trusted secure system component
One embodiment is in the form of a Self-Service Terminal (SST), such as an automated teller machine (ATM). The SST includes a peripheral device, such as a cash...
US-9,485,243 Securing a wireless mesh network via a chain of trust
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon...
US-9,485,241 Secure communication paths in data networks with tethered devices
A communication network processes intermediate security data from intermediate access nodes on a communication path between a network access node and an...
US-9,485,229 Object level encryption system including encryption key management system
A symmetric PGP encrypted communications path is provided in which the recipient may be identified with only publicly available information. Data to be...
US-9,485,098 System and method of user authentication using digital signatures
The present disclosure pertains to data security, and more specifically, to a method and system of user authentication using an electronic digital signature of...
US-9,485,097 Device, system, and method for registering and authenticating handwritten signatures and archiving handwritten...
There is provided an electronic pen device configured to be used with a remote secure server for registering handwritten signatures, the secure server...
US-9,485,056 Optical transceiver and data mapping method using thereof
Disclosed is an optical transceiver. The optical transceiver includes a decoder for decoding an 8B10B line-coded signal; a data mapper for separating the...
US-9,483,932 Systems and methods for a safety status indicator system
The present invention provides systems and methods for tracking a safety status of a number of individuals, and providing pro-active security and response based...
US-9,483,657 Secure online distributed data storage services
The data vaporizer provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such...
US-9,483,656 Efficient and secure data storage utilizing a dispersed data storage system
A method of securely storing data to a dispersed data storage system is disclosed. A data segment is arranged along the columns or rows of an appropriately...
US-9,483,646 Data exfiltration prevention from mobile platforms
Technology is disclosed for preventing an exfiltration of a data associated with an application executing on a mobile device. The technology can migrate the...
US-9,483,632 Intelligent controller system and method for smart card memory modules
A storage device contains a smart-card device and a memory device, both of which are accessed though a controller. The storage device may be used in the same...
US-9,483,631 System and method for remotely assigning and revoking access credentials using a near field communication...
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have...
US-9,483,456 Grid data management
Systems and methods are provided for managing data in a grid. In one example approach, a method comprises importing data from a data source to a range of cells...
US-9,483,336 Method for correcting memory error of application program
A method for correcting a memory error of an application program are provided, which includes: when an error occurs in a memory occupied by an application...
US-9,483,330 Trusted client-centric application architecture
Trusted Client-Centric Application Architecture (TC.sup.2A.sup.2) provides the ability to securely exchange data between applications. TC.sup.2A.sup.2 may be...
US-9,483,249 On-board applet migration
An electronic device (such as a cellular telephone) automatically installs and personalizes updates to an applet on a secure element in the electronic device....
US-9,483,194 File processing method and apparatus, and storage device
A file processing method and a storage device for storing a file in a redundant array of independent disks (RAID) are disclosed. In this method, the storage...
US-9,481,318 Seat belt buckle incorporating a display
A seat belt buckle for receiving a latch plate of a vehicle seat belt includes a housing having a slot for receiving the latch plate, a locking mechanism within...
US-9,480,878 Exercising apparatus
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
US-9,479,937 Using a wireless beacon to provide access credentials to a secure network
There are provided systems and methods for using a wireless beacon to provide access credentials to a secure network. A network access device, such as a WiFi...
US-9,479,825 Terminal based on conditional access technology
The terminal comprises a tuner, a security chip and a digital television terminal main chip. The tuner is used to receive cable television broadcast data...
US-9,479,816 Networked personal video storage and delivery
A portable video delivery device includes data storage, a secure processor, and a wireless network interface that acts as an access point for a secure personal...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.