Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,483,932 Systems and methods for a safety status indicator system
The present invention provides systems and methods for tracking a safety status of a number of individuals, and providing pro-active security and response based...
US-9,483,657 Secure online distributed data storage services
The data vaporizer provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such...
US-9,483,656 Efficient and secure data storage utilizing a dispersed data storage system
A method of securely storing data to a dispersed data storage system is disclosed. A data segment is arranged along the columns or rows of an appropriately...
US-9,483,646 Data exfiltration prevention from mobile platforms
Technology is disclosed for preventing an exfiltration of a data associated with an application executing on a mobile device. The technology can migrate the...
US-9,483,632 Intelligent controller system and method for smart card memory modules
A storage device contains a smart-card device and a memory device, both of which are accessed though a controller. The storage device may be used in the same...
US-9,483,631 System and method for remotely assigning and revoking access credentials using a near field communication...
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have...
US-9,483,456 Grid data management
Systems and methods are provided for managing data in a grid. In one example approach, a method comprises importing data from a data source to a range of cells...
US-9,483,336 Method for correcting memory error of application program
A method for correcting a memory error of an application program are provided, which includes: when an error occurs in a memory occupied by an application...
US-9,483,330 Trusted client-centric application architecture
Trusted Client-Centric Application Architecture (TC.sup.2A.sup.2) provides the ability to securely exchange data between applications. TC.sup.2A.sup.2 may be...
US-9,483,249 On-board applet migration
An electronic device (such as a cellular telephone) automatically installs and personalizes updates to an applet on a secure element in the electronic device....
US-9,483,194 File processing method and apparatus, and storage device
A file processing method and a storage device for storing a file in a redundant array of independent disks (RAID) are disclosed. In this method, the storage...
US-9,481,318 Seat belt buckle incorporating a display
A seat belt buckle for receiving a latch plate of a vehicle seat belt includes a housing having a slot for receiving the latch plate, a locking mechanism within...
US-9,480,878 Exercising apparatus
An apparatus is disclosed for enabling an operator to exercise comprising a frame having a body, a base and a top. A load is positioned on the frame for...
US-9,479,937 Using a wireless beacon to provide access credentials to a secure network
There are provided systems and methods for using a wireless beacon to provide access credentials to a secure network. A network access device, such as a WiFi...
US-9,479,825 Terminal based on conditional access technology
The terminal comprises a tuner, a security chip and a digital television terminal main chip. The tuner is used to receive cable television broadcast data...
US-9,479,816 Networked personal video storage and delivery
A portable video delivery device includes data storage, a secure processor, and a wireless network interface that acts as an access point for a secure personal...
US-9,479,571 Systems, methods, and computer program products for interfacing multiple service provider trusted service...
System, methods, and computer program products are provided for interfacing between one of a plurality of service provider (SP) trusted service managers (TSM)...
US-9,479,534 Method, system, and logic for in-band exchange of meta-information
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy...
US-9,479,529 Polymorphic security policy action
In one embodiment, a method of improving the security of a computing device comprises using a computing device that has received one or more messages that have...
US-9,479,526 Dynamic comparative analysis method and apparatus for detecting and preventing code injection and other network...
A security appliance includes a vulnerable testbed that simulates at least one known vulnerability, and a secure testbed that simulates not having that...
US-9,479,525 Interacting with a remote server over a network to determine whether to allow data exchange with a resource at...
Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange with...
US-9,479,496 Communication terminal and secure log-in method acquiring password from server using user ID and sensor data
A communication terminal is provided with functions to redirect authentication data, make a substitute reply of a password to a biometric authentication part,...
US-9,479,487 Security key generation for simultaneous multiple cell connections for mobile device
A first security context is established between a given user computing device and a first network computing device to enable a secure data connection between...
US-9,479,485 Network security method and network security servo system
A network security method and a network security servo system are provided. The method includes: decrypting a plurality of encrypted data points from an...
US-9,479,464 Computer system and network interface with hardware based packet filtering and classification
A data processing system adapted for high-speed network communications, a method for managing a network interface and a network interface for such system, are...
US-9,479,463 System and method for data center security enhancements leveraging managed server SOCs
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
US-9,479,426 Agile network protocol for secure communications with assured system availability
A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field....
US-9,479,396 XML based generic UNIX discovery framework
Services that support recovery of a data center require collecting information concerning the service customer's physical and virtual infrastructure, and...
US-9,479,375 Joint physical layer security and PAPR mitigation in OFDM systems
Systems and methods for securing orthogonal frequency division multiplexing (OFDM) transmission of data are discussed herein. Transceivers can sense the signal...
US-9,479,335 Encrypted mass-storage device with self running application
An encrypted mass-storage drive device with self-running application is disclosed. The encrypted mass-storage drive device allows storage of vital documents and...
US-9,477,877 Asset security management system
Systems and methods for monitoring assets at a premises on a utility grid. Face print information is extracted from image data received. The face print...
US-9,477,845 Secure application debugging
A method, system, and/or computer program product enables secure debugging of a software application. A first computer receives a secure software application...
US-9,477,844 Context-based security screening for accessing data
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with...
US-9,477,843 Inhibiting access to sensitive vehicle diagnostic data
A vehicle system and method of secure communication between a vehicle and an external device communicating with the vehicle in a diagnostics mode. The method...
US-9,477,839 Methods for centralized privacy-preserving collaborative threat mitigation
One embodiment of the present invention provides a system to facilitate collaboration for mitigating network threats. During operation, the system receives...
US-9,477,834 Maintaining secure data isolated from non-secure access when switching between domains
A data processing apparatus including circuitry for performing data processing, a plurality of registers; and a data store including regions having different...
US-9,477,825 System for transparent authentication across installed applications
A system for authenticating mobile device users transparently is disclosed. This invention improves on the existing flaws by deriving encryption keys from...
US-9,477,824 Cloud control system and method for LAN-based controlled apparatus
A cloud control system for LAN-based controlled apparatus and method for the same is disclosed. The cloud control system includes a cloud server and a LAN...
US-9,477,820 Systems and methods for using unique device identifiers to enhance security
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can...
US-9,477,502 Parallel processing of data for an untrusted application
An untrusted application is received at a data center including one or more processing modules and providing a native processing environment. The untrusted...
US-9,474,099 Smart connectors and associated communications links
"Smart" connectors with embedded processors, measurement circuits and control circuits are disclosed for establishing a "contactless" radio frequency (RF)...
US-9,473,943 Methods and apparatus for managing data within a secure element
Apparatus and methods for managing and sharing data across multiple access control clients in devices. In one embodiment, the access control clients comprise...
US-9,473,935 Dynamic transmission of personal data to only trusted entities
Secure storage of important/relevant information on a device and/or internet cloud is facilitated, and enables automatic transmission of that important/relevant...
US-9,473,934 Wireless telecommunications network, and a method of authenticating a message
A method is provided of authenticating a message from a femtocell base station in a wireless telecommunications network comprising a security gateway and a...
US-9,473,920 Personal security alert and monitoring apparatus
A personal monitoring apparatus and methods of using the personal monitoring apparatus for contacting one or more third parties through wireless signals and/or...
US-9,473,533 Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
US-9,473,532 Data loss prevention (DLP) methods by a cloud service including third party integration architectures
Embodiments of the present disclosure include data loss prevention methods by a cloud-based service including third party integration architectures. The...
US-9,473,515 Method, device and system for securely downloading data
A method for data downloading is provided, including: sending a download request, and sending a security check request according to the download request;...
US-9,473,514 Efficient sensor data delivery
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
US-9,473,512 Methods and systems to implement fingerprint lookups across remote agents
The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.