Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,779,258 Confidential extraction of system internal data
Secure extraction of state information of a computer system is provided. A method includes obtaining, by a security engine of a system, a public encryption key...
US-9,779,255 Split storage and communication of documents
Embodiments for preventing data loss and allowing selective access data include systems and methods that receive a data payload to be stored by the system;...
US-9,779,252 Crowd-sourced security analysis
A cloud-based static analysis security tool that is accessible by a set of application development environments is augmented to provide for anonymous knowledge...
US-9,779,248 Protection of secured boot secrets for operating system reboot
Protecting secured boot secrets while starting an operating system. Embodiments include starting a first operating system using a trusted computing base,...
US-9,779,246 System and method for updating an operating system for a smart card or other secure element
A secure element includes a boot program comprises instructions for the execution a startup step to determine if a non-volatile memory stores an active...
US-9,779,244 Establishing secure initial state in a processing platform containing both high assurance security and...
A method including initializing the processing platform, wherein initializing the processing platform includes performing a power on self-test (POST) configured...
US-9,779,241 Synchronization of UEFI secure boot variables on a managed server
Techniques are provided for actively managing secure boot variables. Such techniques include receiving a request from an entity to modify a portion of a basic...
US-9,779,232 Trusted code generation and verification to prevent fraud from maleficent external devices that capture data
A user equipment. The user equipment comprises a processor, a memory, a trusted security zone, wherein the trusted security zone provides hardware assisted...
US-9,779,225 Method and system to provide access to secure features of a device
A method of providing access to secure features of a device includes detecting motion of a secured device during entry of first access credentials on the...
US-9,779,033 Memory management device and non-transitory computer readable storage medium
In one embodiment, a storage unit stores a table tree and verifier tree. The table tree includes parent and child tables. The verifier tree includes parent and...
US-9,778,868 Data recorder for permanently storing pre-event data
A data recorder for permanently storing pre-event data may include a read-write memory with a plurality of bit cells in the read-write memory. Each bit cell may...
US-9,778,640 System-based control of programmable devices
A requirement exists for machine-to-machine communications between the multiple Smart Devices and Networks (SDNs) a user has without in today's environment of...
US-9,776,730 Independently operable flight data capture and transmission device
An independently operable flight data capture and transmission device includes an aerodynamically efficient main body having a mounting bracket for securing the...
US-9,774,577 Device, system and method providing data security and attribute based data access in participatory sensing
Disclosed are devices, systems, and methods for securing data using attribute based data access. The data may correspond to a sensory environment, and the data...
US-9,774,446 Managing use of security keys
A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply...
US-9,773,121 Security application for data security formatting, tagging and control
A security program installed or in communication with a computer is provided. The security program is configured to intercept disk (I/O) operations that...
US-9,772,845 Method and apparatus to process KECCAK secure hashing algorithm
A processor includes a plurality of registers, an instruction decoder to receive an instruction to process a KECCAK state cube of data representing a KECCAK...
US-9,769,949 Mobile video, audio, and sensory apparatus
A self-contained mobile surveillance apparatus has applicability in a variety of short or long term settings where security and documentation of activities are...
US-9,769,664 Nonce silent and replay resistant encryption and authentication wireless sensor network
An access point and a sensor node are disclosed for use within a wireless sensor network. The wireless sensor network includes at least one access point adapted...
US-9,769,658 Certificating vehicle public key with vehicle attributes
A method for providing secure connection between vehicles. A unique pair of digitally signed public key and private key is provided to each vehicle, along with...
US-9,769,639 Secure emergency response technology
Technology for securely processing emergency response. An emergency response server receives intermittent location data from a client device during...
US-9,769,276 Real-time network monitoring and security
A hardware device for monitoring and intercepting data packetized data traffic at full line rate, is proved. In high bandwidth embodiments, full line rate...
US-9,769,213 Method and system for secure digital object management
A system and method for secure data object management system comprising a cloud-based host environment and a local secure container. The cloud-based host...
US-9,769,170 Synchronizing credential hashes between directory services
The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a...
US-9,769,169 Secure sensor data transport and processing
The present disclosure is directed to secure sensor data transport and processing. End-to-end security may prevent attackers from altering data during the...
US-9,769,149 Proxy-less secure sockets layer (SSL) data inspection
Some embodiments of proxy-less Secure Sockets Layer (SSL) data inspection have been presented. In one embodiment, a secured connection according to a secured...
US-9,769,148 Secure application access system
A proxy server receives a synchronization request from an application program resident on a user device. The proxy server determines that the user device...
US-9,769,144 Method for logging of a remote control session
A method for logging of a remote control session, for use in a remote control system comprising a session initiator operable to initiate a remote control...
US-9,769,137 Extensible mechanism for securing objects using claims
An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more...
US-9,769,131 Fast reconfiguring environment for mobile computing devices
An example method includes receiving an indication of a selection of a first application environment that includes a first virtual environment associated with a...
US-9,769,130 Systems and methods of transmitting data
Systems and methods of transmitting data from one location to another location that can be used in a number of applications including, but not limited to,...
US-9,769,046 Sensor-based detection and remediation system
The invention comprises a method and system of deploying and managing sensor agents to provide services to networks and devices within a network. The invention...
US-9,768,965 Methods and apparatus for validating a digital signature
Various embodiments include one or more of systems, methods, software, and data structures for validating a digital signature, wherein common information in a...
US-9,768,958 Visible-light communication-based encryption, decryption and encryption/decryption method and system
Embodiments of the present invention provide a method and system of encryption, decryption, and encryption and decryption based on visible light communication....
US-9,768,955 System and method for exchanging encryption keys between a mobile device and a peripheral device
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless...
US-9,768,823 Convertible data carrier cradle for electronic mobile device
A data carrier is convertible into a cradle for a mobile communications device. The data carrier includes a first manipulation line downstream of a cutout in...
US-9,767,680 Abberation detection technology
In some implementations, techniques are described for detecting abnormal installations in a property monitored by a monitoring (e.g., security) system. For...
US-9,767,676 Security system storage of persistent data
A security system including devices generating persistent data, a local control system (LCS) including a microprocessor and non-volatile memory and receiving...
US-9,767,631 Garage door status and control via a security system
Methods, systems, and devices are described that are directed to status and control of a garage door system via an alarm system controller. A garage door system...
US-9,767,527 Diamond-based tradeable instrument security system
A tradeable commodity or instrument, a trading system for a plurality of such commodities, a method of trading using such a system and security systems related...
US-9,767,482 Intelligent interactive voice response system for processing customer communications
Extracting and sharing user preference information includes receiving a call from a user device, retrieving user information from a user account stored in a...
US-9,767,323 Spatial security for stored data
Systems and methods of providing spatial security of data stored on a hard disk drive. A method includes associating a user with at least one track and/or...
US-9,767,321 Setting security features of programmable logic devices
Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated...
US-9,767,318 Secure controller systems and associated methods thereof
Systems and methods for encrypted processing are provided. For example, an apparatus for encrypted processing includes: an input interface adapted to receive...
US-9,767,317 System to provide cryptographic functions to a markup language application
A browser includes modules to provide markup language applications with access to cryptographic functions executing in a secure zone. Non-secure operations...
US-9,767,315 Systems and methods for initiating immediate data erasure on a device
A system and method of erasing data on a data handling device may include providing a device with a data storage element and a biometric characteristic scanning...
US-9,767,310 Systems and methods for secure data exchange and data tampering prevention
Systems and methods for secure data exchange and data tampering prevention. A secure data system receives electronic data files from data entities and stores...
US-9,767,306 Secured data storage on a hard drive
Secured electronic data storage on a hard drive is described. A computer system that incorporates the hard drive includes a shrink, shred, and data...
US-9,767,299 Secure cloud data sharing
A system and method for sharing an encrypted file stored on a cloud server is disclosed. In certain embodiments, the method includes generating a file key...
US-9,767,295 Content based hardware security module assignment to virtual machines
At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.