Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,669,508 Grinding wheel with identification tag
A grinding wheel assembly for use in a sharpening system includes a grinding wheel configured to be mounted in the sharpening system to carry out sharpening...
US-9,669,330 WWTP sensor cartridge
Embodiments describe apparatuses, systems and methods for utilizing a configurable WWTP container having a removable sensor/controller cartridge. Said removable...
US-9,667,723 High performance IP processor using RDMA
An architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide...
US-9,667,698 Secure port forwarding to access data between public processing locations and on-premise components
A method for transmitting data from an on-premise component to an off-premise computer image includes: sending a message from the off-premise computer image to...
US-9,667,659 Determining security factors associated with an operating environment
Embodiments of the present invention disclose a method, computer program product, and system for determining security factors associated with an operating...
US-9,667,654 Policy directed security-centric model driven architecture to secure client and cloud hosted web service...
A policy directed, security-centric model driven architecture is described to secure internal web services, such as those implementing service-oriented...
US-9,667,639 Systems and methods for detecting fraudulent electronic communication
Systems and methods are presented for receiving a plurality of request messages to analyze electronic communications. For each request message of the plurality...
US-9,667,627 Airport security check system and method therefor
A decryption system for decrypting user identification information encrypted on a storage device associated with a user identity document is disclosed. The...
US-9,667,621 Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
US-9,667,421 Federated key management
A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by...
US-9,667,338 Multiband wireless data transmission between aircraft and ground systems
Provided are methods and systems for multiband wireless data transmission between aircraft and ground systems. The transmission uses different wavelength...
US-9,667,316 Aircraft data transmission using phase separation
Provided are methods and systems for terrestrial data transmission between aircrafts and external networks connected to gates at airports. This type of data...
US-9,665,965 Video-associated objects
A companion object to a media player, such as a video player, is responsive to an event associated with the video player. The event may be associated with the...
US-9,665,739 Display device having security function
Display device includes timing controller, display panel, data driver, and scan driver. The timing controller includes an authentication processing unit...
US-9,665,704 Method and system for providing password-free, hardware-rooted, ASIC-based, authentication of human to a...
Biometric data are obtained from a biometric sensor on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The...
US-9,665,654 Secure connections in an interactive analytic visualization infrastructure
A method and system is described securely capturing up-to-date data and presenting the up-to-date data in an analytic visualization. An update server receives a...
US-9,665,638 Systems and methods for secure storage of user information in a user profile
Systems and methods are provided for securely storing information of a user in a user profile to prevent access to the information and minimize the amount of...
US-9,665,503 Efficient packet handling, redirection, and inspection using offload processors
A packet handling system is disclosed that can include at least one main processor; a plurality of offload processors connected to a memory bus and configured...
US-9,665,307 Incremental continuous data protection
Systems and techniques are provided for incremental Continuous Data Protection (iCDP) as a process to secure frequent, and space efficient, versions of...
US-9,665,081 Intelligent power utilization system and method for parks
A system for intelligent electric power utilization of park and a method thereof are provided. The system includes an acquisition system, a data processing...
US-9,662,871 Apparatus and method for application of sticky back material
An automatic applicator of a sticky back material to a printing sleeve is disclosed. The applicator includes a controller that is programmable with data...
US-9,661,016 Data center infrastructure management system incorporating security for managed infrastructure devices
A system is disclosed for enhancing detection of a security threat to a managed infrastructure device operating within a data center. The system may have a data...
US-9,660,998 Secure proxy
Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy...
US-9,659,290 Financial transaction system
A system and method for conducting a financial transaction is disclosed. The system includes a first memory location embedded in a personal portable device. The...
US-9,659,184 Multi-identity graphical user interface for secure file sharing
In the approaches described herein, a data file storage service may control access to file system objects using corresponding "personal" or organization-related...
US-9,654,465 Software-defined network threat control
In Software-Defined Network (SDN), a trust controller and trust processor exchange hardware-trust data over an SDN southbound interface to maintain ...
US-9,654,450 Computerized method and system for managing secure content sharing in a networked secure collaborative exchange...
In embodiments of the present invention, improved capabilities are described for securely sharing computer data content between business entities as managed...
US-9,654,296 Handling sensor data
An apparatus, a system and a method for securing sensor data by a security engine circuitry of a system on chip (SoC). For example, the security engine may...
US-9,654,256 Method of utilizing a relay node in wireless communication system
The present invention relates to a wireless communication system and a user equipment (UE) providing wireless communication services, and more particularly, a...
US-9,653,004 Systems and methods for downloading code and data into a secure non-volatile memory
A method for downloading information into a secure non-volatile memory of a secure embedded device (SED) during a manufacturing or personalization process. The...
US-9,652,798 Systems and methods for identifying product recommendations based on investment portfolio data
The disclosed embodiments include, for example, systems and methods for providing recommendations of one or more alternative products to a user based on...
US-9,652,635 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-9,652,622 Data security utilizing disassembled data structures
Various examples are directed to machines and methods for disassembling and reassembling data structures. An ordered set of functions may be applied to a data...
US-9,652,542 Securely extending analytics within a data warehouse environment
A vendor is authenticated for use of a retailer's data warehouse and limited access rights are assigned to the vendor for access. The vendor accesses a...
US-9,648,355 Adaptive security camera image compression apparatus and method of operation
A lossy compression method optimizes bandwidth and storage for a security surveillance network. An appliance on a local network attached to event capture...
US-9,648,288 Information processing system and method, information processing apparatus, image-capturing device and method,...
A feature extracting unit obtains sensor data from a plurality of sensors to calculate each feature. When an event determining unit determines the occurrence of...
US-9,648,042 Apparatus and method for managing security content using virtual folder
Provided are an apparatus and method for managing security contents using a virtual folder. The apparatus for managing security contents includes a data control...
US-9,648,034 Systems and methods for detecting and scoring anomalies
Systems and methods for detecting and scoring anomalies. In some embodiments, a method is provided, comprising acts of: determining whether the digital...
US-9,648,012 Automatic propagation of password updates on multiple devices
Embodiments are directed to techniques to automatically propagate password updates onto other devices that use a shared password to protect respective secure...
US-9,648,009 Efficient network layer for IPv6 protocol
An electronic device may include a network interface that may enable the electronic device to wirelessly couple the electronic device to other electronic...
US-9,647,992 Secure transfer and tracking of data using removable nonvolatile memory devices
A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark...
US-9,647,968 Systems and methods for invoking chatbots in a channel based communication system
Disclosed systems and methods join a user to pre-existing primary communication channels based upon the information obtained from a user profile. Each channel...
US-9,647,837 Securely filtering trust services records
Embodiments include method, systems, and computer program products for filtering trust services records. Embodiments include receiving a trust services record...
US-9,647,836 Secure storage for shared documents
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption...
US-9,647,834 Systems and methods with cryptography and tamper resistance software security
Provided is an arbitrary automation system for secure communications. The system includes a utility device configured for processing critical data associated...
US-9,647,709 Convertible data carrier cradle for electronic mobile device
A data carrier including a SIM card may be converted into a cradle to support a mobile communications device after the SIM card is removed and inserted into the...
US-9,646,712 Implementing eFuse visual security of stored data using EDRAM
A method and circuit for implementing Electronic Fuse (eFuse) visual security of stored data using embedded dynamic random access memory (EDRAM), and a design...
US-9,646,444 Electronic wireless hand held multimedia device
An electronic wireless hand held multimedia device includes a microprocessor and more than one wireless transceiver modules enabling wireless communications...
US-9,646,434 Method and system for controlling access to a restricted location
The present disclosure describes techniques for controlling access a restricted location (114) as well as a system (100) for doing so. According to various...
US-9,646,333 System and method for providing a virtual presence while securely managing and applying user profile data
Systems and methods for responding to the arrival of a person within a defined geographic area after receiving a virtual presence of the person at a target...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.