Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,378,784 Security device using high latency memory to implement high update rate statistics for large number of events
A security device includes a controller configured to determine a flow identifier and an event counter associated with a received data packet and a counter...
US-9,378,633 System to provide a security technology and management portal
A system to facilitate management of surveillance devices, that are distributed over a monitored region, through a geographic information (GI) portal, having GI...
US-9,378,616 Device security in a gaming machine
A gaming system employs a device security firewall having a plurality of rules and an inclusion list of a plurality of devices allowed to operate on a gaming...
US-9,378,518 Electronic signature security system
One embodiment of the invention enhances the security of electronic signatures during transmission. A peripheral device, which may be located remotely and...
US-9,378,498 Method for loading double e-wallets
The invention discloses a method for loading double e-wallets, relating to the information security field. The method includes steps of entering into a...
US-9,378,496 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-9,378,495 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-9,378,392 Methods and systems for controlling access to custom objects in a database
In embodiments, methods and systems for controlling access to custom objects are provided. These techniques for controlling access to custom objects can enable...
US-9,378,391 Method and apparatus for creating switchable desktops with separate authorizations
A system and method for creating switchable desktops each with its own authorization. The system provides a custom authentication and authorization data store...
US-9,378,387 Multi-level security cluster
Some embodiments may include multiple computers comprising a multi-level security system. The security system includes a first set of zones and a second set of...
US-9,378,385 Systems and methods for determining whether transmission of sensitive data is expected
The disclosed computer-implemented method for determining whether transmission of sensitive data is expected may include (1) identifying a computer program that...
US-9,378,384 Secure endpoint file export in a business environment
Embodiments for preventing data loss in a business environment are provided. In some embodiments, a secure endpoint file export application assigns users to...
US-9,378,383 Location based disk drive access
Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a...
US-9,378,378 Stateful data geofencing
An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of...
US-9,378,359 Gateway for controlling mobile device access to enterprise resources
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,378,344 Method and apparatus for protecting information based on data card
The present invention discloses a method and apparatus for protecting information based on a data card, and the method comprises: selecting information which...
US-9,378,339 System, method, and device for delivering communications and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
US-9,378,252 Custom web services data link layer
A data interface efficiently transports, manages, and provides data transfer. The data transfer may happen between a data storage layer and a presentation...
US-9,378,221 Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
US-9,378,220 Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
US-9,377,626 Remote control augmented motion data capture
A head mounted display system for use with a mobile computing device, comprises a soft main body made entirely of a soft and compressible material, the main...
US-9,374,756 Secure wireless device handoff
Examples disclosed herein provide systems, methods, and software for rolling over a data communication from one communication network to another. In one...
US-9,374,685 Offline content distribution networks
Approaches, techniques, and mechanisms are disclosed for the secure distribution of media content to devices having minimal or no Internet connectivity....
US-9,374,422 Secure distributed data storage
A method of securely distributing and storing content may include receiving user content and identifying a number of storage servers that are configured to...
US-9,374,389 Method and system for ensuring an application conforms with security and regulatory controls prior to deployment
Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an...
US-9,374,385 Remediating computer security threats using distributed sensor computers
A data processing system comprises a security control computer performing operations comprising: receiving, an advertising exchange network computer,...
US-9,374,381 System and method for real-time malware detection based on web browser plugin
According to a method and system for real-time malware detection based on web browser plugin, the method and system may connect a web server of a web site...
US-9,374,374 Systems and methods for securing social media for users and businesses and rewarding for enhancing security
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed "social media." Recent trends have...
US-9,374,364 Method and system for implementing video two factor authentication
A method for authentication includes receiving a log-in request at a first client computer, and capturing user information with the request. The method includes...
US-9,374,346 Agile network protocol for secure communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service, and at least one processor configured to execute...
US-9,374,345 Transparent encryption/decryption gateway for cloud storage services
A mechanism is provided for secure data storage in a distributed computing system by a client of the distributed computing system. A gateway device intercepts a...
US-9,374,344 Secure end-to-end communication system
A secure end-to-end communication system is implemented via one or more security processing devices. In one embodiment, a method includes: loading, by a key...
US-9,374,226 Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or...
A method for generating a virtual recursive secure container and for generating a virtual secure container of relationship of rights along with a system that...
US-9,374,225 Document de-registration
Security of a plurality of registered digital documents in a system are monitored and the monitoring includes determining whether signatures associated with the...
US-9,374,223 Methods and apparatus for including a confidential structural component in a third party remote product simulation
A method of allowing inclusion of a structural component which is the confidential property of an owner in a third party remote product simulation, the method...
US-9,374,222 Secure communication of data between devices
A capability for secure communication of data from a source device to a destination device is presented. The source device has a device identifier associated...
US-9,374,219 Method and apparatus for securing access to an integrated circuit
A method and apparatus are described securely testing an integrated circuit (IC). When the IC is powered on, a first bit stream including unencrypted data bits...
US-9,373,942 System for the contactless data supply of bus participant modules
The present invention relates to a modular data transmission system which is constructed for contactless data transmission by means of electromagnetic waves...
US-9,373,377 Apparatuses, integrated circuits, and methods for testmode security systems
Apparatuses, integrated circuits, and methods are disclosed for testmode security systems. In one such example apparatus, a data storage is configured to store...
US-9,373,236 Systems and methods for securing handheld electronic devices
Systems and methods are provided for securing handheld electronic devices. To provide an optimal shopping experience for consumers, handheld electronic devices...
US-9,373,122 Methods, apparatus and computer program products for securely accessing account data
Customer data is securely downloaded to a browser toolbar by performing a check to determine whether a request for customer data includes a request for personal...
US-9,372,996 Protecting data owned by an operating system in a multi-operating system mobile environment
An approach is provided for protecting data owned by an operating system on a mobile computing device having multiple operating systems. A map specifying...
US-9,372,988 User controllable platform-level trigger to set policy for protecting platform from malware
Embodiments of systems, apparatuses, and methods to protect data stored in a storage system of a device from malware alternation are described. In some...
US-9,372,975 Secure recording and sharing system of voice memo
According to an aspect of an embodiment, a system for secure recording and sharing of audio data includes a communication interface, a registration module, a...
US-9,372,972 System and method for establishing and monetizing trusted identities in cyberspace with personal data service...
A system and method for establishing and monetizing trusted identities in cyberspace relying upon user opt in. Users request to attain secure IDs for accessing...
US-9,372,967 Support for secure objects in a computer system
A method and structure in a computer system, including a mechanism supporting a Secure Object that includes code and data that is cryptographically protected...
US-9,372,908 Merging an out of synchronization indicator and a change recording indicator in response to a failure in...
A first data structure stores indications of storage locations that need to be copied for forming a consistency group. A second data structure stores...
US-9,372,813 Remote-key based memory buffer access control mechanism
A system and method implementing revocable secure remote keys is disclosed. A plurality of indexed base secrets is stored in a register of a coprocessor of a...
US-9,372,760 Systems and methods for securely storing backup data while facilitating fast failovers
A computer-implemented method for securely storing backup data while facilitating fast failovers may include 1) identifying, at a primary site, a virtual disk...
US-9,372,647 Image forming apparatus capable of printing image data associated with print right, method of controlling the...
An image forming apparatus capable of providing security for print right-associated image data. An image forming apparatus is capable of communicating with a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.