Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,503,472 Profiling cyber threats detected in a target environment and automatically generating one or more rule bases...
A computer implemented method of profiling cyber threats detected in a target environment, comprising: receiving, from a Security Information and Event Manager...
US-9,503,470 Distributed agent based model for security monitoring and response
An architecture is provided for a widely distributed security system (SDI-SCAM) that protects computers at individual client locations, but which constantly...
US-9,503,437 Apparatus for secure hearing device communication and related method
The disclosure provides a client device for hearing device communication and related method. The client device comprises a processing unit, a memory unit, and...
US-9,503,434 Single-pass data compression and encryption
Embodiments compress and encrypt data in a single pass to reduce inefficiencies that occur from compression and encrypting data separately. Typically,...
US-9,503,428 Secure device and proxy for secure operation of a host data processing system
Secure device and proxy operation include generating, using a processor, a first proxy and a first proxy companion paired with the first proxy and providing the...
US-9,503,422 Apparatus, systems, platforms, and methods for securing communication data exchanges between multiple networks...
Apparatus, systems, network platforms, and methods of providing secure communication between multiple networks, and program product for managing heat exchanger...
US-9,503,265 Scheduler and context cache controller and storage for security context
An electronic circuit (200) includes one or more programmable control-plane engines (410, 460) operable to process packet header information and form at least...
US-9,501,804 Multi-core processor for performing energy-related operations in an industrial automation system using energy...
A system may include a multi-core processor that may include a first core configured to determine structured energy data associated with one or more assets in...
US-9,501,795 Validating an electronic order transmitted over a network between a client server and an exchange server with a...
Methods and systems for performing risk checks on electronic orders for securities. According to one embodiment, the method comprises performing risk checks on...
US-9,501,667 Security domain prediction
A data processing apparatus supports operation in both a secure domain and a less secure domain. The secure domain has access to data that is not accessible...
US-9,501,652 Validating sensitive data from an application processor to modem processor
An electronic circuit 120 includes a more-secure processor (600) having hardware based security (138) for storing data. A less-secure processor (200) eventually...
US-9,501,649 Systems and methods for determining potential impacts of applications on the security of computing systems
A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application...
US-9,501,647 Calculating and benchmarking an entity's cybersecurity risk score
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity....
US-9,501,628 Generating a distrubition package having an access control execution program for implementing an access control...
A data distribution system, method and program for generating a distribution package for distribution data to a client. An environment of a requesting client...
US-9,501,618 Systems, methods and devices for anonymously collecting personal data using a mobile device
One embodiment of the invention relates to methods and systems for using secure biometric parameters to remotely access electronic databases while rendering the...
US-9,501,447 Secure handle for intra- and inter-processor communications
A protocol element referred to as a secure handle is described which provides an efficient and reliable method for application-to-application signaling in...
US-9,501,252 Method and apparatus for secure image data processing
An image processing apparatus includes an image data acquiring unit that acquires image data, and a transmitting unit that, if a first destination specified as...
US-9,501,242 Solid-state drive data security enhancement
Embodiments of the present disclosure provide a method and apparatus for storage control. The method comprises: in response to having received a data deletion...
US-9,501,157 Secure KVM system having multiple emulated EDID functions
The present invention discloses a KVM (Keyboard Video Mouse) device for operation in high security environments. More specifically, this invention discloses a...
US-9,501,156 Adjustable ergonomic keyboard
An adjustable ergonomic keyboard includes keyboard segments coupled by a joint allowing the keyboard segments to pivot relative to one another. A retainer...
US-9,500,545 Methods and apparatus for using black box data to analyze vehicular accidents
Disclosed are methods and apparatus for using black box data to analyze vehicular accidents. The methods include obtaining information from an event data...
US-9,497,622 System and method for providing network security to mobile devices
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
US-9,497,620 Method and system for implementing smart card remote operation based on smart card web server
A method and system for implementing a smart card remote operation based on a smart card web server is provided. As a mobile phone is prompted to activate...
US-9,497,615 Method and system for providing communication services to a roaming wireless device
Method and system for optimizing the roaming mechanism through handling by the visited network the data that are sent by the wireless devices without routing...
US-9,497,573 Security protocols for unified near field communication infrastructures
One feature pertains to a near field communication (NFC) target device comprising a memory circuit adapted to store sensitive data, an NFC interface adapted to...
US-9,497,266 Disk mirroring for personal storage
Embodiments of the present invention provide a system for backing up personal data between two mated (i.e., paired) network attached storage (NAS) devices. The...
US-9,497,224 Systems and methods for implementing computer security
A security server transmits a specification of a first set of files and directories to a computing device for monitoring according to a security policy. Each of...
US-9,497,223 System and method for configuring a computer system according to security policies
Method and system for configuration of a computer system according to security policies. The configuration of an employee's personal computer system according...
US-9,497,220 Dynamically generating perimeters
Systems and techniques relating to securely managing electronic resources are described. A described technique includes receiving a request to add to a mobile...
US-9,497,214 System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file associated with an insurance...
US-9,497,197 Systems and methods for secure resource access and network communication
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy...
US-9,497,192 Data leak protection
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a data leak protection method is...
US-9,497,172 Method of encrypting and transferring data between a sender and a receiver using a network
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of...
US-9,497,169 Method and system for selective protection of data exchanged between user equipment and network
A method and system for providing selective protection of data exchanged between user equipment (UE) and network is disclosed. The selective protection is...
US-9,497,163 Identifying malicious devices within a computer network
This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more...
US-9,497,161 Bi-directional data security for supervisor control and data acquisition networks
A cyber-security device provides secure communications bi-directionally between an external network and an internal network including a supervisor control and...
US-9,497,062 System and method for secure storage, transfer and retrieval of content addressable information
An algorithm (such as the MD5 hash function) is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest). The file is...
US-9,496,981 System and method of masking electromagnetic interference (EMI) emissions of a circuit
A system is provided for securing information residing on a circuit (e.g., processor). In particular, a system and method is provided for masking...
US-9,496,936 Secure contactless data communication
In one embodiment, a method includes receiving, at a first device, a first signal transmitted from a first antenna and receiving a second signal after receiving...
US-9,496,666 Aircraft power and data distribution system and methods of performing the same
A electrical distribution unit comprising a housing, a securing unit connected to the housing and to a seat track in an aircraft, at least one outlet unit on...
US-9,495,809 Guaranteed postage
A system and method for managing a value of a descending register of a postal security device (PSD) in accordance with a guarantee is disclosed. Mailing data...
US-9,495,680 Secure payment card transactions
Identification cards at a processing server may be secured in certain embodiments by intercepting data associated with the identification card. The data may be...
US-9,495,674 Enabling secure transactions with an underpowered device
In a system and method for enabling secure monetary transactions with an unpowered and/or underpowered user device, embodiments include a payment device...
US-9,495,652 Autonomic discrete business activity management method
Discrete Business Activity Management is a method whereby continuous streams of data formatted in one or more taxonomies, originating from two or more networked...
US-9,495,588 Biometric template security and key generation
Methods and systems for securing biometric templates and generating secret keys are provided. One or more images are received. Interest points are identified...
US-9,495,556 Secure cloud storage distribution and aggregation
Methods and systems for secure cloud storage are provided. According to one embodiment, a trusted gateway device establishes and maintains multiple...
US-9,495,550 System and method for sharing of data securely between electronic devices
A system for securely sharing data and conducting transactions in an electronic environment. The system may include a personal information device having a...
US-9,495,545 Automatically generate attributes and access policies for securely processing outsourced audit data using...
Methods, systems, and computer-readable storage media for secure storage of and selective access to encrypted audit data. Implementations include actions of...
US-9,495,544 Secure data transmission and verification with untrusted computing devices
Techniques from the proposed invention relate to providing enhanced security. For example, techniques described herein allow a computer system, such as a mobile...
US-9,495,529 Method and apparatus for measuring body balance of wearable device
A wearable device includes a communication unit that wirelessly communicates with a first external device; a motion sensor that senses the user's motion; and a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.