Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,767,323 Spatial security for stored data
Systems and methods of providing spatial security of data stored on a hard disk drive. A method includes associating a user with at least one track and/or...
US-9,767,321 Setting security features of programmable logic devices
Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated...
US-9,767,318 Secure controller systems and associated methods thereof
Systems and methods for encrypted processing are provided. For example, an apparatus for encrypted processing includes: an input interface adapted to receive...
US-9,767,317 System to provide cryptographic functions to a markup language application
A browser includes modules to provide markup language applications with access to cryptographic functions executing in a secure zone. Non-secure operations...
US-9,767,315 Systems and methods for initiating immediate data erasure on a device
A system and method of erasing data on a data handling device may include providing a device with a data storage element and a biometric characteristic scanning...
US-9,767,310 Systems and methods for secure data exchange and data tampering prevention
Systems and methods for secure data exchange and data tampering prevention. A secure data system receives electronic data files from data entities and stores...
US-9,767,306 Secured data storage on a hard drive
Secured electronic data storage on a hard drive is described. A computer system that incorporates the hard drive includes a shrink, shred, and data...
US-9,767,299 Secure cloud data sharing
A system and method for sharing an encrypted file stored on a cloud server is disclosed. In certain embodiments, the method includes generating a file key...
US-9,767,295 Content based hardware security module assignment to virtual machines
At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module...
US-9,767,294 Intermediate server, database query processing method and program
To make it possible to prevent leakage of sensitive information from a database without using a server having both secure operation management and a high...
US-9,767,293 Content based hardware security module assignment to virtual machines
At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module...
US-9,767,287 Systems, methods, and computer program products for managing data re-installation
Systems, methods, and computer program products are provided for managing data re-installation including service re-installation. A re-installation procedure...
US-9,767,268 Optimizing a compiled access control table in a content management system
A method, computer program product, and system for improving the operation and management of a content management system, by managing data security and...
US-9,767,267 Method and apparatus for making a decision on a card
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and...
US-9,767,262 Managing security credentials
Disclosed are various embodiments for managing security credentials. In one embodiment, a request for a security credential is obtained from a client and is...
US-9,767,249 Energy consumption via VPN configuration management
An automation system including a plurality of peripheral devices, each configured to perform at least one function relating to energy consumption in a facility...
US-9,767,109 Secure data migration in a dispersed storage network
A method begins by a dispersed storage (DS) processing module identifying a candidate dispersed storage (DS) unit of a dispersed storage network (DSN). In...
US-9,767,013 Detecting code alteration based on memory allocation
Techniques are described for identifying anomalous execution instance of the process as a security risk by analyzing the memory allocation for the process....
US-9,766,957 Method and processes for securely autofilling data fields in a software application
The present invention gives the methods and processes for automatically servicing user driven requests to find placeholder fields, fill them in with relevant...
US-9,766,615 Motor drive system data interface system and method
A motor drive system includes a motor drive processor, a motor drive memory component, a server, and a display that displays a machine readable code, wherein...
US-9,766,263 Apparatus and method for detecting disease in dairy animals
Disclosed is apparatus and a method for detecting udder disease in dairy animals. An accelerometer is attached to each of a plurality of dairy animals. A...
US-9,764,893 Thief hatch monitoring system
The present invention is directed to a device and system for monitoring the closure state of a hatch. A pressure sensor is positioned between the upper sealing...
US-9,763,164 System and method for enabling VPN-less session setup for connecting mobile data devices to an enterprise data...
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile...
US-9,763,096 Mobile application identification and control through WiFi access points
A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones,...
US-9,763,089 Protecting sensitive data in a security area
Managing data security on a mobile device. Data associated with a mobile device is received; the data includes an identification (ID) of the mobile device and a...
US-9,763,063 Secure broadcast beacon communications
Using various embodiments, methods and systems for secure Bluetooth Low Energy communications, in an unconnected state, are described herein. In one embodiment,...
US-9,762,678 Method, apparatus and computer program for modifying an endpoint reference representing a web service endpoint
WS-Addressing EndpointReferences represent Web service endpoints and are propagated in the SOAP Envelope as part of Web service interactions. There is disclosed...
US-9,762,675 System and method for secure real-time cloud services
A system and method for providing secure, end-to-end data service enabling real-time data over the Internet is disclosed. The system and method provides a...
US-9,762,617 Security threat information analysis
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing data that includes security threat information....
US-9,762,615 Management apparatus and method for controlling management apparatus
A device management apparatus sets a first password required to reflect a security policy managed by the device management apparatus on a device or change the...
US-9,762,603 Assessment type-variable enterprise security impact analysis
A data management service identifies sensitive data stored on enterprise databases according to record classification rules that classify a data record as...
US-9,762,595 Secure cross domain solution systems and methods
Generally discussed herein are systems, apparatuses, and methods for secure transfer of content across a security boundary. A system can include a high side...
US-9,762,585 Tenant lockbox
Tenant approval for operator access to tenant data is provided. In order to grant service personnel operators access to a tenant's data for performing a...
US-9,762,575 Method for performing communication via fingerprint authentication and electronic device thereof
A method is provided for operating a first electronic device. The method includes determining sameness of first fingerprint data and second fingerprint data....
US-9,762,571 Securing connections to unsecure internet resources
There is provided a method for automatically intercepting two or more data packets transported over a computer network, where the data packets originated from...
US-9,762,554 Handling of performance monitoring data
System, methods, nodes, and computer program for handling performance monitoring data in a communication network are described. The communication network (100)...
US-9,762,553 Systems and methods of secure data exchange
In embodiments of the present invention improved capabilities are described for managing digital rights management (DRM) protected content sharing in a...
US-9,762,552 Efficient sensor data delivery
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
US-9,762,550 Low latency active noise cancellation system with client intercommunication
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content...
US-9,762,548 Controlling encrypted data stored on a remote storage device
A method, system, and apparatus are provided for controlling encrypted data stored on a remote device. In particular, a remote device includes a storage...
US-9,762,547 System and method for routing-based internet security
Method and system for improving the security of storing digital data in a memory or its delivery as a message over the Internet from a sender to a receiver...
US-9,762,538 Flow ownership assignment in a distributed processor system
A security device for processing network flows includes one or more packet processors configured to receive incoming data packets associated with one or more...
US-9,762,536 One way secure link
A method for secure communications between a transmitting computer (24) and a receiving computer (22) includes transmitting data from the transmitting computer...
US-9,762,531 Position parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
US-9,762,387 Discovery and secure transfer of user interest data
A method for establishing an encrypted communication channel is described. Query IDs are generated at a first device. Each query ID identifies a keyword in a...
US-9,762,316 Lightweight pairing and connection transfer protocol via gesture-driven shared secrets
A gesture is performed by a wireless accessory attempting to pair with a device. The gesture comprises a series of user interactions associated with accessory...
US-9,761,104 Baggage identification and location system
A baggage identification and location system is provided with a plurality of baggage tags, a software application, a data center and a plurality of scanners...
US-9,760,888 Secure mobile user interface
The invention provides systems and method for securely inputting user data from a user into a mobile device and also for generating user data to be input by a...
US-9,760,738 Storing and transmitting sensitive data
A computer-implemented method for storing and transmitting sensitive data is disclosed including storing source data on a secure data storage of a secondary...
US-9,760,729 Method, secure device, system and computer program product for securely managing user access to a file system
A method, a secure device, a system and a computer program product for securely managing user access to a file system. The method includes providing a secure...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.