Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,552,722 Modular communicator for use in life critical network
A modular patient communicator provides for communications with a patient implantable medical device (PIMD) and connectivity with a central authority (CA) via...
US-9,552,719 Systems and methods of dynamically varying a pre-alarm time of a security system
Systems and methods of adjusting a pre-alarm time are provided, including detecting, by a sensor, an entry into a building by a person and generating detection...
US-9,552,710 Systems and methods for customer deactivation of security elements
Systems (100) and methods (1100) for activating an Electronic Article Surveillance ("EAS") element deactivator. The methods involve: obtaining customer-related...
US-9,552,684 Methods and systems configured to detect and guarantee identity for the purpose of data protection and access...
A security system is provided that integrates physical and logical security controls for the protection of secured resources. The resources may include physical...
US-9,552,683 Controlling access to a resource
A system is provided for controling access to a resource, the access being restricted by an access mechanism. The system comprises an access control subsystem...
US-9,552,577 Method and apparatus for the transfer of a money amount by using a two dimension image code
The present disclosure concerns a method for transferring a money amount by using a two-dimension image code. It provides that the registration of the transfer...
US-9,552,521 Human body security inspection method and system
The present invention provides a human body security inspection method and system. The method comprises: retrieving in real-time scanning row or column image...
US-9,552,495 System and method for security and privacy aware virtual machine checkpointing
A checkpointing method for creating a file representing a restorable state of a virtual machine in a computing system, comprising identifying processes...
US-9,552,492 Secure application access system
A proxy server creates an index of keywords, receives an encrypted record, decrypts the received encrypted record as decrypted data and, when a keyword in the...
US-9,552,491 Systems and methods for securing data
Systems and methods for securing data are disclosed. An administrative system may create a secure configuration. The secure configuration may disable...
US-9,552,466 System and method for remotely assigning and revoking access credentials using a near field communication...
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have...
US-9,552,431 Unified online content manager apparatuses, methods, and systems
Apparatuses, methods, and systems for transforming user identification information and user selection data inputs into a profile data output, a generated query...
US-9,552,307 Information processing apparatus and computer program product
According to an embodiment, an information processing apparatus includes a secure OS, a non-secure OS, and a monitor. The monitor is configured to switch...
US-9,552,181 Method and apparatus for authorizing a print device to perform a service
A document printing system may include a print engine, a controller coupled to the print engine and a communication port in electrical communication with the...
US-9,552,173 Robust data replication
Disclosed is a system for replicating data. The system may comprise a plurality of nodes preferably organized in groups with one of the nodes acting as a...
US-9,552,062 Gaze-based security
Systems and methods for presenting actual data on a display device based on eye-tracking data. An eye-tracking engine receives sensed data from an eye-tracking...
US-9,551,543 Secure smartphone-operated gun lock with means for overriding release of the lock
A gun locking and unlocking device, which may be configured to be disposed on or in a gun to alternatively prevent or enable firing, includes a data receiver, a...
US-9,550,091 System and method for capturing exercise data
The system and method for capturing exercise data may include offsetting an imaginary longitudinal axis of a center beam of a workout bar and an imaginary...
US-9,549,324 Coexistence of multiple radios in a medical device
A computer-implemented diabetes management system is provided that supports enhanced security between a diabetes care manager in data communication with a...
US-9,549,321 Remote provisioning of 3GPP downloadable subscriber identity module for virtual machine applications
A method is presented of providing a subscriber identity for the provision of services on behalf of the subscriber in a virtual computing environment. The...
US-9,549,216 Client device with secure clock and methods for use therewith
A client device includes a network interface that is coupled to receive media content and server time data via a network, wherein the media content is protected...
US-9,549,110 Light device has built-in digital data system for record image, sound
A Light device having built-in digital data means is powered by an unlimited power source for a lamp-holder, LED bulb, or light device connected to unlimited...
US-9,549,087 System and method for guaranteed high speed fax delivery
Described herein is a fax processing system that improves the speed and reliability of fax transmissions via a data communications network and provides a new...
US-9,548,987 Intelligent remediation of security-related events
An information processing system implements an intelligent remediation system for security-related events. The intelligent remediation system comprises a...
US-9,548,981 Method and system for providing security for universal plug and play operations in a home network environment...
A method and system for providing security to Universal Plug and Play (UPnP) operations in a home network environment based on ownership rights where a request...
US-9,548,967 Method and apparatus for interworking authorization of dual stack operation
A method and apparatus for dynamic home address assignment by a home agent in multiple network interworking. The invention provides a method and apparatus send...
US-9,548,913 Communication system and transmission unit employed in same
Provided are a communication system that is capable of acquiring information having a relatively large data amount by a transmission unit while securing a...
US-9,548,866 Deletion of content in digital storage systems
A data processing and storage apparatus has a hardware security module and a data storage medium storing encrypted data objects and a hierarchical data...
US-9,548,594 Electronic device and load center including the same
An electronic device includes a housing defining an exterior shape of the electronic device, a processor, a power supply structured to receive line power and to...
US-9,547,957 System and method for implementing internet-based games wherein a plurality of different games share a common...
A system and computer implemented method for conducting play of Internet-based lottery games includes providing players with a plurality of different...
US-9,547,779 Method and apparatus for secure execution using a secure memory partition
A processor includes a plurality of general purpose registers and cryptographic logic to encrypt and decrypt information. The cryptographic logic is to support...
US-9,547,773 Secure event log management
A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A...
US-9,547,771 Policy enforcement with associated data
Requests submitted to a computer system are evaluated for compliance with policy to ensure data security. Plaintext and associated data are used as inputs into...
US-9,547,770 System and method for managing collaboration in a networked secure exchange environment
In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations,...
US-9,547,723 Data processing based on two-dimensional code
The present disclosure provides example methods and apparatuses of data processing based on a two-dimensional code. The two-dimensional code is generated upon...
US-9,547,488 Firmware update system for video security equipment
A firmware update system includes video security equipment and an update server. When receiving an error report from the video security equipment, the update...
US-9,547,465 Object shadowing in head worn computing
Aspects of the present disclosure relate to a secure data transfer method, including identifying a second head worn computing system ("HWC") in close proximity...
US-9,546,835 Automatic electronic communication system for tracking firearms
This invention provides a system, method and algorithm for automatic electronic communication between a firearm formed with a location tracking system and a...
US-9,544,775 Security mechanism for mobile users
A wireless communication device for use in a cellular network. The device comprises a radio interface for enabling communication between the device and a base...
US-9,544,766 System and method for authentication and key exchange for a mobile device via spectrally confined wireless...
An architecture, system and associated method and apparatus for securely communicating authentication data to a communication device. In one embodiment, the...
US-9,544,547 Monitoring smart devices on a wireless mesh communication network
A surveillance system and method with at least one wireless input capture device ICD(s) and a corresponding digital input recorder (DIR) and/or another ICD,...
US-9,544,545 Vehicle service system optical target assembly calibration
A machine vision vehicle wheel alignment system for acquiring measurements associated with a vehicle. The system includes at least one imaging sensor having a...
US-9,544,395 Facilitating quality of service and security via functional classification of devices in networks
Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device of...
US-9,544,380 Data analytics and security in social networks
A method for securing a social network account assigned to a member is provided. The method may include determining at least one social network account assigned...
US-9,544,327 Prioritizing security findings in a SAST tool based on historical security analysis
A cloud-based static analysis security tool accessible by a set of application development environments is augmented to provide for anonymous knowledge sharing...
US-9,544,325 Social network security monitoring
A computer-implemented method includes security settings data associated with one or more profiles of a protected social entity on one or more social networks...
US-9,544,318 HTML security gateway
A technique allows a client computing system with a web browser to receive a web page in response to transmitting a request for content. The web page may...
US-9,544,314 Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
US-9,544,308 Compliant authentication based on dynamically-updated credentials
A system, method and a computer-readable medium for authenticating a user in a live manner in non-face-to-face transactions, including a user downloading an...
US-9,544,307 Providing a security mechanism on a mobile device
Disclosed are methods, apparatus, systems, and computer program products for providing a security mechanism on a mobile device before performing an action on a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.