Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,531,680 Method and apparatus for secure data transmissions
An apparatus, system, and method are disclosed for secure data transmissions. In one embodiment, a method includes receiving a request for data from a remote...
US-9,531,679 Content-based transport security for distributed producers
A content-producing computer system can use a locally generated key or a client-generated key to communicate with a client device during a session over a...
US-9,531,672 Network device implementing two-stage flow information aggregation
A network security device includes a network flow statistics processing engine to process network flow information related to network flows. The network flow...
US-9,531,670 System and method for network virtualization and security using computer systems and software
Methods and systems are provided for network security. In one embodiment, the method involves receiving a data packet (e.g., from a firewall). The method also...
US-9,531,669 Bi-directional data security for supervisor control and data acquisition networks
A cyber-security device provides secure communications bi-directionally between an external network and an internal network including a supervisor control and...
US-9,531,593 Takeover processes in security network integrated with premise security system
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a...
US-9,531,580 Method, apparatus, and computer program product for dynamic security based grid routing
A method of routing data that is part of a grid job including steps of: receiving a data packet at a routing device; determining whether the data packet is...
US-9,531,548 Security system for handheld wireless devices using time-variable encryption keys
In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time...
US-9,531,544 Two-dimensional bar code for ID card
A method and apparatus for an identity card having improved security features. The identity card can have a two-dimensional bar code or similar encoding of data...
US-9,531,538 Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing...
Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who...
US-9,531,535 Secure memories using unique identification elements
Various embodiments of the invention relate to secure systems and modules, and more particularly, to systems, devices and methods of generating and applying...
US-9,531,532 Method for establishing a secure communication channel
The present invention provides a method for establishing a secure communication channel between a client (C) and a remote server (S), said client (C) and remote...
US-9,531,531 Methods and devices for fixed execution flow multiplier recoding and scalar multiplication
One feature pertains to an electronic device that includes a memory circuit and a processing circuit. The processing circuit computes a scalar multiplication...
US-9,530,436 Methods and systems for providing data security in data storage devices
A data storage device comprising a storage media and a controller is disclosed. The controller is configured to receive a write command including a logical...
US-9,530,303 Building security system
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the...
US-9,530,294 Methods and apparatus for pairing items for security
An item of value comprises an assembly of parts. The parts comprise a component that has value independent of the item, and an assembly security system that is...
US-9,530,176 Image processing apparatus and method for processing image thereof
An image processing apparatus and image processing method thereof are disclosed. The image processing apparatus includes a first image processor which includes...
US-9,530,129 Secure authentication and payment system
The present invention provides a service for allowing secure financial transactions to be carried out, the service involving authenticating a user's identity...
US-9,530,126 Secure mobile payment processing
A system for processing payment data includes a payer terminal, a recipient terminal, and a payment server. The payer terminal is adapted to return, to the...
US-9,530,060 System and method for building automation using video content analysis with depth sensing
A method and system for monitoring buildings (including houses and office buildings) by performing video content analysis based on two-dimensional image data...
US-9,530,026 Privacy protection for participatory sensing system
Provided is a method that may be used for privacy protection. The method comprises: generating a pseudonym at a user equipment in association with sensed data;...
US-9,530,023 Reach objects
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a row level security. One of the methods includes receiving,...
US-9,530,014 Method and a device for making a computer application secure
In one embodiment, a security method for making secure a computer application being executed on a terminal is disclosed. In one embodiment the security method...
US-9,530,012 Processing extensible markup language security messages using delta parsing technology
Markup language security messages are processed. A template corresponding to a markup language security message is identified. The markup language security...
US-9,530,005 Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
US-9,530,003 Computer system and method of securely booting a computer system
A computer system includes a data network connection, a reading device, an input component and a security device, wherein the security device establishes a data...
US-9,530,000 Secure privilege level execution and access protection
The subject disclosure is directed towards using one or more of hardware, a hypervisor, and privileged mode code to prevent system mode code from accessing user...
US-9,529,998 Systems and methods for securing virtual machine computing environments
Systems and methods are provided for securing data in virtual machine computing environments. A request is received for a security operation from a first...
US-9,529,996 Controlling mobile device access to enterprise resources
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,529,978 Cloud E-DRM system and service method thereof
A digital rights management system and a service method thereof, and an enterprise digital rights management (E-DRM) system for document security installed in a...
US-9,529,968 System and method of integrating mobile medical data into a database centric analytical process, and clinical...
The present invention provides a system and method of integrating mobile medical data into a database centric analytical process, and clinical workflow. This...
US-9,529,931 Image display device and memory management method of the same
According to the present disclosure, there is disclosed an image display device and a memory management method thereof. According to an embodiment of the...
US-9,529,735 Secure data encryption in shared storage using namespaces
A data storage device in a distributed computing system has physical block addresses that are each allocated to multiple namespaces. To access the data storage...
US-9,529,733 Systems and methods for securely accessing encrypted data stores
The disclosed computer-implemented method for securely accessing encrypted data stores may include (1) receiving, from a data storage service, a request to...
US-9,529,690 Anomaly detection system, anomaly detection method, and program for the same
An anomaly detection system for detecting an anomaly within a network as a first embodiment in order to provide an anomaly detection system, anomaly detection...
US-9,529,356 Data management system of an aircraft
A system to manage transmissions of data between a flight management system (e.g., of an avionics type) of an aircraft and a portable electronic (e.g., of an...
US-9,529,014 System and method for acquiring electrical measurements of an electronic device
Provided is a method and an apparatus for acquiring electrical measurements of an electronic device. The method and the apparatus comprise securing an...
US-9,526,009 Protecting data stored on a mobile communication device utilizing a personal identification number code of a...
A method for protecting data on a mobile communication device, comprising: reading existing security data from a universal integrated circuit card (UICC) during...
US-9,526,007 Location brokering for providing security, privacy and services
Location brokering technique embodiments are presented that employ sensor data captured by a user's mobile device to determine the device's location, encrypt...
US-9,526,000 Secure wireless network setup using multicast packets
A method is described of adding a wireless device to a secure wireless local area network (WLAN) that is secured by a wireless network security key. A computer...
US-9,525,703 Method, system, and logic for in-band exchange of meta-information
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy...
US-9,525,697 Delivering security functions to distributed networks
Systems and methods for delivering security functions to a distributed network are described herein. An exemplary method may include: processing a data packet...
US-9,525,696 Systems and methods for processing data flows
A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and...
US-9,525,692 Secure content sharing
Convenient sharing of information among authorized network users may be facilitated by allowing a user to send information originating from multiple...
US-9,525,690 Securely integrating third-party applications with banking systems
Systems and methods enable third-party applications and devices to interface with financial service provider computer networks in a secure, compliant manner. In...
US-9,525,674 Method for the encryption of data
To improve known encryption methods for communication in non-secured wireless networks, the invention proposes using an active key for encryption, in each...
US-9,525,670 Computer product, recording medium, communications apparatus, and communications method
Improvement of the security of communication is facilitated. A server receives from an on-vehicle device, encrypted data obtained by encrypting ECU information...
US-9,525,668 Face based secure messaging
In an embodiment, a system includes at least one core and a trusted execution environment (TEE) to conduct an identity authentication that includes a comparison...
US-9,525,666 Methods and systems for managing concurrent unsecured and cryptographically secure communications across...
An endpoint, method, and authorization server are disclosed which can be used to allow concurrent secure and clear text communication. An endpoint includes a...
US-9,525,564 Secure virtual network platform for enterprise hybrid cloud computing environments
A secure virtual network platform connects two or more different or separate network domains. When a data packet is received at an end point in one network...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.