Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,729,864 Camera based safety mechanisms for users of head mounted displays
The disclosure provides methods and systems for warning a user of a head mounted display that the user approaches an edge of field of view of a camera or one or...
US-9,729,836 Information processing system and method, information processing apparatus, image-capturing device and method,...
A feature extracting unit obtains sensor data from a plurality of sensors to calculate each feature. When an event determining unit determines the occurrence of...
US-9,729,628 Systems and methods for enabling temporary, user-authorized cloning of mobile phone functionality on a secure...
Temporary, user-authorized cloning of physical mobile phone functionality via a secure server can enable physical mobile phone features to be accessed and...
US-9,729,554 Secure data transmission
A system may include a first network in which user device(s) and a HIP server are communicably coupled. The first network may include a secure data...
US-9,723,651 Enhanced connection management for multiple access networks
Semi-connected state operation for UEs in multiple-access networks is described. In the semi-connected state, UEs may monitor system information and paging, and...
US-9,723,436 Mobile device location
A mobile device is associated with a mobile communications network. The mobile device comprises: a transmitter for sending a request, to the mobile...
US-9,723,055 System and method for acceleration of a secure transmission over satellite
A broadband communication system with improved latency is disclosed. The system employs acceleration of secure web-based communications over a satellite...
US-9,723,019 Infected endpoint containment using aggregated security status information
In one example, a network device may store health status information specifying a current security status for each of a plurality of authenticated endpoint...
US-9,723,015 Detecting malware-related activity on a computer
Detecting malware-related activity on a computer by detecting activity associated with the creation of a data object, where the activity is performed by a...
US-9,723,014 Detecting malware-related activity on a computer
Detecting malware-related activity on a computer by detecting activity associated with the creation of a data object, where the activity is performed by a...
US-9,723,013 Secondary asynchronous background authorization (SABA)
A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is transparent...
US-9,723,009 System and method for providing for secure network communication in a multi-tenant environment
A security solution provides secure communication in a multi-tenant environment which includes a connection-based fabric, storage cells holding data associated...
US-9,723,008 System and method for providing an integrated firewall for secure network communication in a multi-tenant...
An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which...
US-9,723,004 Method of controlling access to network drive, and network drive system
A network drive system for controlling access to a network drive based on location information on a communication device according to the present technology...
US-9,723,001 Method and system for state machine security device
A security device may be utilized to provide security measures to an electronic device that may incorporate the security device or be coupled to it. The...
US-9,722,994 User terminal for password-based authentication, and password-based trading terminal, system, and method
A user terminal, a password-based trading terminal, a system and a method for password-based authentication are provided. Wherein, the user terminal comprises a...
US-9,722,972 Methods and apparatuses for secure communication
A method of establishing a secure communications path between a first local server on a local network and a device on a wide area network comprising:...
US-9,722,919 Tying data plane paths to a secure control plane
In one embodiment, a router located at an exit edge of an autonomous system (AS) receives a data packet in a data plane, and determines a destination of the...
US-9,722,895 Vendor usage monitoring and vendor usage risk analysis system
A vendor usage assessment system analyzes network traffic from an enterprise data network and generates vendor usage analytics for the enterprise. In some...
US-9,721,111 Methods of dynamically securing electronic devices and other communications through environmental and system...
This invention is for a system capable of securing one or more fixed or mobile computing device and connected system. Each device is configured to change its...
US-9,716,690 Integrated security switch
An integrated security switch and related method for managing connectivity and security among networks. The integrated security switch includes a security...
US-9,715,601 Secure access in a microcontroller system
Systems, methods and computer-readable mediums are disclosed for providing secure access in a microcontroller system. In some implementations, a microcontroller...
US-9,713,574 Dose counting device for coupling with a medical container
The present invention relates to a dose counting device (10) for coupling with a medical container filled with a number N of doses of a product to be withdrawn...
US-9,712,564 System and method for providing network and computer firewall protection with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
US-9,712,508 One-touch device personalization
Technologies for one-touch device personalization include at least two mobile computing devices configured to communicate with a personalization server. The...
US-9,710,984 Method for the authentication of at least one first unit on at least one second unit
A method for unilaterally or mutually authenticating at least one first unit, especially a mobile device, on at least one second unit, especially a field...
US-9,710,853 System and method for computer implemented collateral management
A data processing system manages collateral risk associated with a trade of a financial instrument includes memory coupled to a processor, the memory containing...
US-9,710,659 Methods and systems for enforcing, by a kernel driver, a usage restriction associated with encrypted data
A method of providing a restricted set of application programming interfaces includes decrypting, by a secure object information reader executing on a computing...
US-9,709,255 Smart home-care security device
A smart home-care security device includes a security device that includes a master control board and installed for home use. The master control board is...
US-9,709,124 Instrumented damper and performance monitoring system comprising such a damper
A damper having an external armature that is symmetric about a longitudinal axis, an internal armature that is arranged partially inside the external armature...
US-9,707,429 Dynamic pendula stool
Disclosed herein is a dynamic pendula stool possessing a foot, a leg secured to the foot, and a seat secured to the top end of the leg. The leg has a telescopic...
US-9,705,910 Testing web applications for security vulnerabilities with metarequests
A method includes instantiating, in response to a request by an executing application, an input data object with one or more uninitialized fields and traversing...
US-9,705,865 Secure information storage and delivery system and method
A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault...
US-9,705,841 Private mobile messaging and data communications apparatus and method of managing organizational messaging
A private mobile data communications apparatus and methods of managing organizational data flow and coordinate a secure messaging infrastructure allow...
US-9,705,759 Data leakage protection in cloud applications
A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon...
US-9,705,676 Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management
A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full...
US-9,705,672 Key management method and system
Disclosed are a key management method and system. A master key is remotely downloaded to avoid the problem that the master key is not issued to a merchant until...
US-9,705,567 Distributed data storage system and method
A system for storing long-term digital data comprises data storage equipment including one or more data storage devices 26 stored in a sealed data storage...
US-9,704,355 Secure point of sale terminal and associated methods
Methods and systems for processing secure information are disclosed. One method includes receiving secure data from a user via an input device. The method also...
US-9,703,965 Secure containers for flexible credential protection in devices
Techniques are provided for protecting encryption key(s) and other protected material on devices, such as mobile devices. A device stores an encrypted container...
US-9,703,947 Relevancy improvement through targeting of information based on data gathered from a networked device...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with...
US-9,703,331 Board fastener for securing a data storage device in an information handling system
A board fastening apparatus includes an anchor and a key connected by a flexible tether. The anchor may include a pedestal and a collar. The pedestal may be...
US-9,702,966 Synthetic underwater visualization system
A synthetic underwater visualization system (SUVS) comprising a real-time graphics software engine, a sophisticated underwater environmental sensor, a...
US-9,701,061 Tendon placement for high-altitude balloons
Aspects of the disclosure relate to manufacturing balloon envelopes for use in high-altitude mesh networks for packet-data communications. As an example, a gore...
US-9,700,087 Illuminated glove assembly
An illuminated glove assembly includes a glove and an illumination data controller. The glove has a body portion, a longitudinal glove axis, a pointer...
US-9,699,604 Telemetric tracking of a portable computing device
A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and...
US-9,699,304 System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the...
US-9,699,162 Personal area network
An entity may store various levels of sensitive and personal data in a secure computing environment. The entity may create permission rules which allow the data...
US-9,697,519 Multi-layer transaction tracking and encryption
Embodiments for tracking multi-layer secured transactions include systems for providing a dedicated secure transaction channel to a user and sending...
US-9,697,380 Electronic data security apparatus
An apparatus for providing security for an integrated circuit (IC) chip is disclosed. The apparatus may include the IC chip, attached to a surface of a printed...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.