Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,582,986 Methods, systems, and products for security services
Methods, systems, and products notify of alarms in security systems. Sensor data is received from an alarm sensor, and an alarm controller determines an alarm...
US-9,582,683 Apparatus and method for managing health data
An apparatus and method for managing health data through a user terminal are provided. The method includes inputting a user terminal number for identifying the...
US-9,582,678 Method for secure storing of a data file via a computer communication network
A computer implemented method, server computer and computer program for securely storing a data file via a computer communication network. The method includes:...
US-9,582,676 Adding or replacing disks with re-key processing
In a network of multiple storage devices, a storage device may become faulty and need to be replaced or additional capacity may need to be added through...
US-9,582,674 Risk adaptive information flow based access control
Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the...
US-9,582,673 Separation of duties checks from entitlement sets
A data model in which a set provides an abstraction that isolates the computation of membership from the details of how an enforcement point determines access...
US-9,582,671 Security and data privacy for lighting sensory networks
In various example embodiments, a system and method are provided for protection customer data collected at sensor nodes within a networked system. A key...
US-9,582,669 Systems and methods for detecting discrepancies in automobile-network data
The disclosed computer-implemented method for detecting discrepancies in automobile-network data may include (1) receiving data that indicates at least one...
US-9,582,649 Processing data stored in external storage device
An external storage device connectable to an information processing apparatus is provided. The storage device includes: an input/output interface via which data...
US-9,582,598 Hybrid applications utilizing distributed models and views apparatuses, methods and systems
The Hybrid Applications Utilizing Distributed Models And Views Apparatuses, Methods And Systems ("HAP") transform hybrid application user inputs using HAP...
US-9,582,407 Security role testing using an embeddable container and properties object
Mechanisms are provided for performing security role definition testing. An application is received in a container of a runtime environment of the data...
US-9,581,488 Weighing apparatus with secured communication means
A weighing apparatus 1 comprising a load cell 4, a processing unit 3 external of the load cell 4 and data means 7, 8, 9, 10 for operating the weighing apparatus...
US-9,580,173 Translational correction of payload-release device based on tracked position
An unmanned aerial vehicle (UAV) is disclosed that includes a retractable payload delivery system. The payload delivery system can lower a payload to the ground...
US-9,579,048 Activity monitoring system with haptic feedback
An activity monitoring apparatus is provided. The activity monitoring apparatus includes a retention feature configured to removably secure the monitoring...
US-9,578,510 System and method for wireless handheld device security in a data center environment
A data center includes an access controller with a short range wireless communication controller, and an access point with a long range wireless communication...
US-9,578,507 Managing hidden security features in user equipment
A device determines whether a PTT application is authenticated to access a first API and a second API, and prevents the PTT application from accessing the first...
US-9,578,483 Terahertz wireless communications-based method and system for data transmission
A first terahertz storage device and a second terahertz storage device may be placed within an effective distance to each other, and, by connection and pairing...
US-9,578,445 Systems and methods to synchronize data to a mobile device based on a device usage context
A method, system, and computer-readable medium for synchronizing policy data on a device based on device usage context. By synchronizing policy data on the...
US-9,578,308 Method and apparatus for low cost 3D video making
Video capture devices may be held in a frame having at least two openings and a plurality of slots on a first side and a plurality of tabs on a second side...
US-9,578,291 Security system including modular ring housing
A modular building system arrangement includes a plurality of electrical building systems. Each electrical building system has a housing with a mechanical...
US-9,578,124 Optimization of enhanced network links
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
US-9,578,104 Resumption of play for a content-delivery session
Multimedia content may be delivered to content consumer devices via a content-delivery network. Encrypted content and cryptography keys for decrypting the...
US-9,578,066 Systems and method for assuring security governance in managed computer systems
An agile governance system provides recommendations for infrastructure change requests concerning a cloud-based computer environment in accordance with security...
US-9,578,063 Application self-service for assured log management in cloud environments
A log management service provides automated log management for any applications deployed on a cloud. A security profile defining the logging requirements for...
US-9,578,059 Policy enforcement in a secure data file delivery system
A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server...
US-9,577,992 Data encryption/decryption using neuro and neuro-mechanical fingerprints
In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to...
US-9,577,988 Data encryption, transport, and storage service for carrier-grade networks
A method, a system, and a non-transitory storage medium for storing user preferences pertaining to a data encryption service that provides on-demand encryption...
US-9,577,987 Digital broadcast methods using secure meshes and wavelets
Methods and apparatuses are presented for securely providing digital streaming data to subscriber devices using encrypted wavelet meshes. A recorded image may...
US-9,577,986 Secure data verification technique
A technique for the secure exchange and verification of data between multiple entities that use compatible business management systems utilizes serializable...
US-9,577,831 Relational encryption
A method includes receiving biometric data, the biometric data non-uniformly distributed and processing the biometric data to a level of randomness as a...
US-9,577,822 Secure bitstream authentication
Methods and systems are provided for securely authenticating data of an integrated circuit. By authenticating data having keystream blocks inserted between...
US-9,577,743 Communications system having a secure credentials storage device
The invention relates to a communication system comprising a terminal (10), a first device (1) adapted to exchange data with said terminal (10), a second device...
US-9,577,641 Spin transfer torque based memory elements for programmable device arrays
Disclosed herein are semiconductor device arrays, such as, Field Programmable Gate Arrays (FPGAs) and Complex Programmable Logic Arrays (CPLAs) that use...
US-9,577,374 Textile connector for an electronic textile having a snap fastener with contacts
A textile connector for an electronic textile includes a snap fastener having first and second snap segments configured to be snap fastened together such that...
US-9,576,491 School child tracking system
A system for tracking school buses and school children to enhance the security and safety of schoolchildren and provide real-time information about the location...
US-9,576,469 Systems and methods of adaptively adjusting a sensor of a security system
Embodiments of the disclosed subject matter provide systems and methods of adaptively adjusting sensitivity of a sensor of a security system that provide a...
US-9,576,425 Portable intermediary trusted device
In one embodiment, an intermediary gaming trusted electronic device for use with an untrusted PED may include a position sensor configured to acquire position...
US-9,576,286 Consumer device based point-of-sale
Systems and related methods facilitating interactions between a merchant device, a central system and a consumer device are discussed herein. Wallet identifying...
US-9,576,246 Predictive modeling and data analysis in a secure shared system
A system and method enables users to selectively expose and optionally monetize their data resources, for example on a web site. Data assets such as datasets...
US-9,576,160 Card reader
A card reader may include a card insertion part which is formed with an insertion port into which the card is inserted; and a magnetic sensor which is provided...
US-9,576,156 Download security system
A download security system (100) includes a server (102) and an information processing apparatus (10). The information processing apparatus (10) includes a...
US-9,576,147 Security policy application through data tagging
Techniques are described for applying data usage policies through data tagging. A metadata tag may be applied to data to indicate a type of the data. In some...
US-9,576,144 Secured file system management
Systems and methods for accessing data secured and encrypted using a file system manager are disclosed. One method includes determining whether a community of...
US-9,576,137 Method and system for analyzing integrity of encrypted data in electronic control system for motor vehicle
A method for improving the functional security and increasing the availability of an electronic control system, particularly a motor vehicle control system,...
US-9,576,122 System and method for secure data entry
An electronic device comprises a CPU, and a touch-sensitive screen operable to display a plurality of keys. Each of the plurality of keys are associated with...
US-9,575,926 System and method for optimizing secured internet small computer system interface storage area networks
A network device includes a port coupled to a device, another port coupled to another device, and an access control list with an access control entry that...
US-9,575,906 Method and system for process working set isolation
Embodiments of systems and methods disclosed herein may isolate the working set of a process such that the data of the working set is inaccessible to other...
US-9,575,904 Memory data security
A memory module secures data stored on the memory module. A request for the data from a computer system is received by the memory module. A verification key...
US-9,575,903 Security perimeter
Embodiments of memory devices, computer systems, security apparatus, data handling systems, and the like, and associated methods facilitate security in a system...
US-9,575,824 Systems and methods of secure domain isolation involving separation kernel features
Systems and methods are disclosed for providing secure information processing. In one exemplary implementation, there is provided a method of secure domain...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.