Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,426,660 EHF secure communication device
A communication device employs a contactless secure communication interface to transmit and receive data with a computing device using close proximity extremely...
US-9,426,653 Secure remote access using wireless network
A method includes receiving a request from a mobile device to attach to a private wireless network, determining if a subscriber identifier is in a security...
US-9,426,652 High assurance authorization device
Methods and apparatus are provided for securing the transfer of data over the internet from malicious interference. The apparatus comprises a computing device...
US-9,426,650 Autonomous-mode content delivery and key management
Multimedia content may be delivered to content consumer devices via a content-delivery network. Encrypted content and cryptography keys for decrypting the...
US-9,426,647 Method and device for protecting privacy data of mobile terminal user
Disclosed are a method and device for protecting user privacy data of a mobile terminal in the embodiment of the present invention, related to a wireless...
US-9,426,272 Method and system for a digital diary system
A wireless communication device may generate an interactive digital diary for one or more users. The device may handle location information, multimedia data,...
US-9,426,204 Network connection system for sharing data among independent networks
A network connection system for sharing data among networks using a shared storage to enable easy mail transception, file transception, and use of clipboards,...
US-9,426,179 Protecting sensitive information from a secure data store
In embodiments of the present invention improved capabilities are described for the steps of receiving an indication that a computer facility has access to a...
US-9,426,176 Method, system, and logic for in-band exchange of meta-information
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy...
US-9,426,159 Securing sensor data
Systems and methods include establishing a secure communication between an application module and a sensor module. The application module is executing on an...
US-9,426,149 Mobile secure login system and method
A mobile secure login method comprises steps of 1) displaying a machine readable graphic form encoded with a sign in URL and a unique token on a browser,...
US-9,426,148 Increased communication security
A method of increasing communication security may include receiving, at a first computer system, a first message including a first data portion and a second...
US-9,426,144 Single sign-on service security protections
One embodiment provides a method, including: receiving, from an end user device, authentication data of a user of a web service; storing, in a single sign-on...
US-9,426,140 Federated authentication of client computers in networked data communications services callable by applications
A data processing method providing improved and efficient authentication of client computers by server computers, the method comprising: using authentication...
US-9,426,136 Increased communication security
Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system for delivery to...
US-9,426,135 Increased communication security
Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system for delivery to...
US-9,426,134 Method and systems for the authentication of a user
A computer security system used to identify and authenticate a user. In one aspect, a method for identifying and authenticating a user is provided. The method...
US-9,426,123 Apparatus and methods for content distribution to packet-enabled devices via a network bridge
Apparatus and methods for providing content to packet-enabled devices in a content distribution network. In one embodiment, a network architecture is disclosed...
US-9,425,957 System and method for remote reset of password and encryption key
Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a...
US-9,425,955 Power line communication (PLC) network nodes using cipher then segment security
Embodiments of the invention provide systems and methods for a cipher then segment approach in a Power Line Communication (PLC). A node or device generates...
US-9,425,953 Generating multiple secure hashes from a single data buffer
One embodiment provides an apparatus. The apparatus includes a single instruction multiple data (SIMD) hash module configured to apportion at least a first...
US-9,424,593 Secured identities collaboration system and method
An identities collaboration system that comprises a Personal Service Provider (PSP) system for supplying specific user related personal service(s); means for...
US-9,424,443 Method and apparatus for securing computer mass storage data
In general, embodiments of the invention include methods and apparatuses for securely storing computer system data. Embodiments of the invention encrypt and...
US-9,424,442 Nonvolatile memory and electronic device
The embodiments of the present invention disclose a nonvolatile memory and an electronic device, where each time the nonvolatile memory is powered on, an...
US-9,424,439 Secure data synchronization
Techniques for secure data synchronization are described. In one or more implementations, techniques may be employed to conserve high cost data storage by...
US-9,424,432 Systems and methods for secure and persistent retention of sensitive information
An information processing system provisions a client account for a user to enable a client computer associated with the user to store information in an elastic...
US-9,424,421 Security engine for a secure operating environment
The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a...
US-9,424,419 Automatic rotation and storage of security credentials
A system and method for a credentials agent that automatically rotates and stores security credentials usable at least in part to authenticate calling...
US-9,424,417 Secure current movement indicator
Methods, devices, systems, and non-transitory processor-readable storage media for authenticating a computing device to access functionalities. An embodiment...
US-9,424,416 Accessing applications from secured states
A computing device can enable a user to navigate to an application or other digital object directly from a lock screen of the device. A user can specify a...
US-9,424,200 Continuous run-time integrity checking for virtual memory
A run-time integrity checking (RTIC) method compatible with memory having at least portions that store data that is changed over time or at least portions...
US-9,422,139 Method of actively controlling winch swing via modulated uptake and release
An unmanned aerial vehicle (UAV) including a winch system, wherein the winch system includes a winch line having a first end that is secured to the payload, and...
US-9,421,402 Fall detection device for lifeline; lifeline installation equipped with said device; associated fall detection...
A fall detection device for a lifeline, intended to be mounted on an energy absorber which includes a static portion and a mobile portion secured together,...
US-9,420,636 Mobile network device using a wireless SD card that uses SCSI to SD command conversion
A mobile network access device, system and method are disclosed. The method includes sending data or a command to a storing unit or a baseband processing unit...
US-9,420,629 High bandwidth open wired network
An open network suitable for a mobile platform that contains a plurality of host and peripheral devices. Within the network, a central server communicates with...
US-9,420,454 Method for ensuring security and privacy in a wireless cognitive network
In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management...
US-9,420,339 Method and system for determining subscriber demand for multimedia content
A method of determining demand for multimedia content in a multimedia provider network includes receiving a content demand statistics (CDS) request from a...
US-9,420,240 Intelligent security light and associated methods
A lighting device capable of detecting a condition in an environment includes a sensor to capture a video frame from a location in the environment. The lighting...
US-9,420,219 Integrated security video and electromagnetic pulse detector
The present invention relates systems and methods of electromagnetic protection for integrated video and electromagnetic detector security system equipment. A...
US-9,420,005 Configuring policy settings on client computing devices
Systems and methods for installing policy settings on a client computing device are provided. In some aspects, the client computing device receives policy data...
US-9,420,003 Dynamic communication between secure endpoints
In one implementation, a hub and spoke network is made up of hub network devices and spoke network devices. A security protocol channel is established between...
US-9,420,001 Securing data communications in a communications network
A method of securing communications between first node attached to first network and second node attached to second network. At the second node, first and...
US-9,419,998 Filtering hidden data embedded in media files
Systems and methods for filtering unsafe content at a network security appliance are provided. According to one embodiment, a network security appliance...
US-9,419,993 Randomization of processor subunit timing to enhance security
Technologies are generally provided for a system to enhance security and prevent side channel attacks of targeted functions. Side channel attacks assume that...
US-9,419,984 Secure port forwarding to access data between public processing locations and on-premise components
A method for transmitting data from an on-premise component to an off-premise computer image includes: sending a message from the off-premise computer image to...
US-9,419,979 Increased communication security
A method of increasing communication security may include receiving a first message associated with communication between a first computer system and a second...
US-9,419,958 Multi-tenancy support in a cloud based data grid
A system with a tenant aware in-memory data grid includes a data grid configured to store data in memory. A request manager is configured to receive a data grid...
US-9,419,954 Storing and transmitting sensitive data
A system for secure key management including a secondary device comprising a programmable hardware component and an associated secure data storage, wherein the...
US-9,419,953 Trusted container
A secure identifier is derived, using a secured microcontroller of a computing device, that is unique to a pairing of the computing device and a particular...
US-9,419,951 System and method for secure three-party communications
A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.