Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,380,416 Portable computing device with data encryption and destruction
A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and...
US-9,380,415 Portable computing device with data encryption and destruction
A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and...
US-9,380,059 Systems and methods for configuring an electronic device
A method for configuring a device is performed at a target device with a processor and memory storing instructions for execution by the processor. In some...
US-9,380,040 Method for downloading preauthorized applications to desktop computer using secure connection
A method and computer program product for establishing a connection and downloading server applications on a desktop. A user downloads and installs custom...
US-9,380,029 Security-focused monitoring system
In some implementations, data from security monitoring devices of a facility is collected and analyzed within the facility and the results of the analysis is...
US-9,380,028 Proxy server operation
Data messages having secure data location addresses other than a predefined set are handled by a user terminal (14) in the normal way by setting up a secure...
US-9,380,024 Method and apparatus for providing security to devices
Systems, methods, and apparatus are provided for generating verification data that may be used for validation of a wireless transmit-receive unit (WTRU). The...
US-9,380,023 Enterprise cross-domain solution having configurable data filters
A cross-domain system for transferring files from a client to a server. A first server in the first network domain receives and stores files from the client via...
US-9,379,895 HTTP authentication and authorization management
Systems, methods and apparatus for a distributed security that provides authentication and authorization management. The system can include a source processor...
US-9,379,892 Trusted manager bridge
A system and method for securing processing devices includes a police bridge disposed in one or more data busses between a central processing and input/output...
US-9,379,504 Track having a backing plate with a plurality of slots and electrical contacts adjacent to each other
A modular equipment mount to enable quick relocation of the piece of equipment. The piece of equipment is secured to a mount. A track system is secured to...
US-9,379,140 Array substrate for liquid crystal display devices and method of manufacturing the same
An array substrate for LCD devices and a method of manufacturing the same are provided. By using a structure where an empty space is secured in a data line area...
US-9,378,784 Security device using high latency memory to implement high update rate statistics for large number of events
A security device includes a controller configured to determine a flow identifier and an event counter associated with a received data packet and a counter...
US-9,378,633 System to provide a security technology and management portal
A system to facilitate management of surveillance devices, that are distributed over a monitored region, through a geographic information (GI) portal, having GI...
US-9,378,616 Device security in a gaming machine
A gaming system employs a device security firewall having a plurality of rules and an inclusion list of a plurality of devices allowed to operate on a gaming...
US-9,378,518 Electronic signature security system
One embodiment of the invention enhances the security of electronic signatures during transmission. A peripheral device, which may be located remotely and...
US-9,378,498 Method for loading double e-wallets
The invention discloses a method for loading double e-wallets, relating to the information security field. The method includes steps of entering into a...
US-9,378,496 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-9,378,495 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-9,378,392 Methods and systems for controlling access to custom objects in a database
In embodiments, methods and systems for controlling access to custom objects are provided. These techniques for controlling access to custom objects can enable...
US-9,378,391 Method and apparatus for creating switchable desktops with separate authorizations
A system and method for creating switchable desktops each with its own authorization. The system provides a custom authentication and authorization data store...
US-9,378,387 Multi-level security cluster
Some embodiments may include multiple computers comprising a multi-level security system. The security system includes a first set of zones and a second set of...
US-9,378,385 Systems and methods for determining whether transmission of sensitive data is expected
The disclosed computer-implemented method for determining whether transmission of sensitive data is expected may include (1) identifying a computer program that...
US-9,378,384 Secure endpoint file export in a business environment
Embodiments for preventing data loss in a business environment are provided. In some embodiments, a secure endpoint file export application assigns users to...
US-9,378,383 Location based disk drive access
Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a...
US-9,378,378 Stateful data geofencing
An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of...
US-9,378,359 Gateway for controlling mobile device access to enterprise resources
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,378,344 Method and apparatus for protecting information based on data card
The present invention discloses a method and apparatus for protecting information based on a data card, and the method comprises: selecting information which...
US-9,378,339 System, method, and device for delivering communications and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
US-9,378,252 Custom web services data link layer
A data interface efficiently transports, manages, and provides data transfer. The data transfer may happen between a data storage layer and a presentation...
US-9,378,221 Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
US-9,378,220 Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
US-9,377,626 Remote control augmented motion data capture
A head mounted display system for use with a mobile computing device, comprises a soft main body made entirely of a soft and compressible material, the main...
US-9,374,756 Secure wireless device handoff
Examples disclosed herein provide systems, methods, and software for rolling over a data communication from one communication network to another. In one...
US-9,374,685 Offline content distribution networks
Approaches, techniques, and mechanisms are disclosed for the secure distribution of media content to devices having minimal or no Internet connectivity....
US-9,374,422 Secure distributed data storage
A method of securely distributing and storing content may include receiving user content and identifying a number of storage servers that are configured to...
US-9,374,389 Method and system for ensuring an application conforms with security and regulatory controls prior to deployment
Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an...
US-9,374,385 Remediating computer security threats using distributed sensor computers
A data processing system comprises a security control computer performing operations comprising: receiving, an advertising exchange network computer,...
US-9,374,381 System and method for real-time malware detection based on web browser plugin
According to a method and system for real-time malware detection based on web browser plugin, the method and system may connect a web server of a web site...
US-9,374,374 Systems and methods for securing social media for users and businesses and rewarding for enhancing security
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed "social media." Recent trends have...
US-9,374,364 Method and system for implementing video two factor authentication
A method for authentication includes receiving a log-in request at a first client computer, and capturing user information with the request. The method includes...
US-9,374,346 Agile network protocol for secure communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service, and at least one processor configured to execute...
US-9,374,345 Transparent encryption/decryption gateway for cloud storage services
A mechanism is provided for secure data storage in a distributed computing system by a client of the distributed computing system. A gateway device intercepts a...
US-9,374,344 Secure end-to-end communication system
A secure end-to-end communication system is implemented via one or more security processing devices. In one embodiment, a method includes: loading, by a key...
US-9,374,226 Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or...
A method for generating a virtual recursive secure container and for generating a virtual secure container of relationship of rights along with a system that...
US-9,374,225 Document de-registration
Security of a plurality of registered digital documents in a system are monitored and the monitoring includes determining whether signatures associated with the...
US-9,374,223 Methods and apparatus for including a confidential structural component in a third party remote product simulation
A method of allowing inclusion of a structural component which is the confidential property of an owner in a third party remote product simulation, the method...
US-9,374,222 Secure communication of data between devices
A capability for secure communication of data from a source device to a destination device is presented. The source device has a device identifier associated...
US-9,374,219 Method and apparatus for securing access to an integrated circuit
A method and apparatus are described securely testing an integrated circuit (IC). When the IC is powered on, a first bit stream including unencrypted data bits...
US-9,373,942 System for the contactless data supply of bus participant modules
The present invention relates to a modular data transmission system which is constructed for contactless data transmission by means of electromagnetic waves...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.