Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,530,026 Privacy protection for participatory sensing system
Provided is a method that may be used for privacy protection. The method comprises: generating a pseudonym at a user equipment in association with sensed data;...
US-9,530,023 Reach objects
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a row level security. One of the methods includes receiving,...
US-9,530,014 Method and a device for making a computer application secure
In one embodiment, a security method for making secure a computer application being executed on a terminal is disclosed. In one embodiment the security method...
US-9,530,012 Processing extensible markup language security messages using delta parsing technology
Markup language security messages are processed. A template corresponding to a markup language security message is identified. The markup language security...
US-9,530,005 Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
US-9,530,003 Computer system and method of securely booting a computer system
A computer system includes a data network connection, a reading device, an input component and a security device, wherein the security device establishes a data...
US-9,530,000 Secure privilege level execution and access protection
The subject disclosure is directed towards using one or more of hardware, a hypervisor, and privileged mode code to prevent system mode code from accessing user...
US-9,529,998 Systems and methods for securing virtual machine computing environments
Systems and methods are provided for securing data in virtual machine computing environments. A request is received for a security operation from a first...
US-9,529,996 Controlling mobile device access to enterprise resources
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,529,978 Cloud E-DRM system and service method thereof
A digital rights management system and a service method thereof, and an enterprise digital rights management (E-DRM) system for document security installed in a...
US-9,529,968 System and method of integrating mobile medical data into a database centric analytical process, and clinical...
The present invention provides a system and method of integrating mobile medical data into a database centric analytical process, and clinical workflow. This...
US-9,529,931 Image display device and memory management method of the same
According to the present disclosure, there is disclosed an image display device and a memory management method thereof. According to an embodiment of the...
US-9,529,735 Secure data encryption in shared storage using namespaces
A data storage device in a distributed computing system has physical block addresses that are each allocated to multiple namespaces. To access the data storage...
US-9,529,733 Systems and methods for securely accessing encrypted data stores
The disclosed computer-implemented method for securely accessing encrypted data stores may include (1) receiving, from a data storage service, a request to...
US-9,529,690 Anomaly detection system, anomaly detection method, and program for the same
An anomaly detection system for detecting an anomaly within a network as a first embodiment in order to provide an anomaly detection system, anomaly detection...
US-9,529,356 Data management system of an aircraft
A system to manage transmissions of data between a flight management system (e.g., of an avionics type) of an aircraft and a portable electronic (e.g., of an...
US-9,529,014 System and method for acquiring electrical measurements of an electronic device
Provided is a method and an apparatus for acquiring electrical measurements of an electronic device. The method and the apparatus comprise securing an...
US-9,526,009 Protecting data stored on a mobile communication device utilizing a personal identification number code of a...
A method for protecting data on a mobile communication device, comprising: reading existing security data from a universal integrated circuit card (UICC) during...
US-9,526,007 Location brokering for providing security, privacy and services
Location brokering technique embodiments are presented that employ sensor data captured by a user's mobile device to determine the device's location, encrypt...
US-9,526,000 Secure wireless network setup using multicast packets
A method is described of adding a wireless device to a secure wireless local area network (WLAN) that is secured by a wireless network security key. A computer...
US-9,525,703 Method, system, and logic for in-band exchange of meta-information
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy...
US-9,525,697 Delivering security functions to distributed networks
Systems and methods for delivering security functions to a distributed network are described herein. An exemplary method may include: processing a data packet...
US-9,525,696 Systems and methods for processing data flows
A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and...
US-9,525,692 Secure content sharing
Convenient sharing of information among authorized network users may be facilitated by allowing a user to send information originating from multiple...
US-9,525,690 Securely integrating third-party applications with banking systems
Systems and methods enable third-party applications and devices to interface with financial service provider computer networks in a secure, compliant manner. In...
US-9,525,674 Method for the encryption of data
To improve known encryption methods for communication in non-secured wireless networks, the invention proposes using an active key for encryption, in each...
US-9,525,670 Computer product, recording medium, communications apparatus, and communications method
Improvement of the security of communication is facilitated. A server receives from an on-vehicle device, encrypted data obtained by encrypting ECU information...
US-9,525,668 Face based secure messaging
In an embodiment, a system includes at least one core and a trusted execution environment (TEE) to conduct an identity authentication that includes a comparison...
US-9,525,666 Methods and systems for managing concurrent unsecured and cryptographically secure communications across...
An endpoint, method, and authorization server are disclosed which can be used to allow concurrent secure and clear text communication. An endpoint includes a...
US-9,525,564 Secure virtual network platform for enterprise hybrid cloud computing environments
A secure virtual network platform connects two or more different or separate network domains. When a data packet is received at an end point in one network...
US-9,525,548 Provisioning techniques
Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request...
US-9,524,477 Utilizing a secondary application to render invitational content in a separate window above an allocated space...
Methods and arrangements are provided for utilizing a secondary application to render invitational content. Primary content rendered by a web browser can be...
US-9,524,407 Systems and methods for end-to-end secure link between a near-field communication (NFC) chip and server
Systems and method of the present solution are directed to authenticating and updating a near-field-communication (NFC) chip over a network. According to one...
US-9,524,401 Method for providing controlled access to a memory card and memory card
There is provided a method for providing access to data securely stored in memory card. An exemplary method comprises specifying first time information...
US-9,524,399 Multi-level independent security architecture
A system includes a plurality of data input ports, each port corresponding to one of a plurality of different levels of security classification; a security...
US-9,524,379 Security chip used in a contents data playing device, update management method, and update management program
A security chip is used in a contents data playing device. The security chip includes a storage unit configured to store firmware data including a firmware...
US-9,524,308 System and method for providing pluggable security in an enterprise crawl and search framework environment
A system and method are described, wherein the system includes an enterprise crawl and search framework, abstracts an underlying search engine, provides a...
US-9,524,005 Data center server racks
An example data center server rack may generally include a cabinet, a mounting fixture, and a trough. The mounting fixture may support one or more server units...
US-9,522,688 On-board device, signaling system, and control method of moving vehicle
An on-board device is loaded in a moving vehicle traveling on a track. The on-board device determines whether or not a traveling route has been secured, based...
US-9,521,546 Secure RF communication method, terminal and system
A method, terminal and secure RF communication system are provided. The method for radio frequency secure communication of the invention comprises: generating...
US-9,521,187 Managed filed transfer utilizing dynamic horizontal and vertical scaling
An apparatus, methods, and computer program products are described which transfer files/data from one system to other. Source and target system can be external...
US-9,521,172 Method and system for sharing online content
A system and a computer-implemented method for sharing online content are provided. The method is implemented using a computer device coupled to a user...
US-9,521,166 Systems and methods for testing online systems and content
Systems and methods are provided for automatically monitoring a compliance of web pages and graphical user interfaces with governmental and self-regulatory...
US-9,521,159 Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
US-9,521,145 Methods and apparatuses to provide secure communication between an untrusted wireless access network and a...
A secure communication channel between an access point (AP) device associated with a wireless network and a mobile gateway (GW) device of a packet core network...
US-9,521,135 Method and system for a computer-based, secured communication between data processing units
In a method and a system for a computer-based and secured communication between data processing units a sender selects an alphanumeric and/or image data set,...
US-9,521,132 Secure data storage
A method and apparatus for storing data and performing logical comparisons and other operations on said data, the results of said comparisons and operations...
US-9,521,122 Intelligent security analysis and enforcement for data transfer
An approach is provided for managing a message in a transfer from a computer. A level of sensitivity of data in a payload of the message is determined. A level...
US-9,521,120 Method for securely transmitting control data from a secure network
This method securely transmits data from a secure control system [110] located on an isolated computer network [100] to a separate computer [210] outside the...
US-9,521,118 Secure network privacy system
The invention provides a method and system of receiving communications from a network device in a network to a source of network data and establishing a secure...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.