Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,477,877 Asset security management system
Systems and methods for monitoring assets at a premises on a utility grid. Face print information is extracted from image data received. The face print...
US-9,477,845 Secure application debugging
A method, system, and/or computer program product enables secure debugging of a software application. A first computer receives a secure software application...
US-9,477,844 Context-based security screening for accessing data
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with...
US-9,477,843 Inhibiting access to sensitive vehicle diagnostic data
A vehicle system and method of secure communication between a vehicle and an external device communicating with the vehicle in a diagnostics mode. The method...
US-9,477,839 Methods for centralized privacy-preserving collaborative threat mitigation
One embodiment of the present invention provides a system to facilitate collaboration for mitigating network threats. During operation, the system receives...
US-9,477,834 Maintaining secure data isolated from non-secure access when switching between domains
A data processing apparatus including circuitry for performing data processing, a plurality of registers; and a data store including regions having different...
US-9,477,825 System for transparent authentication across installed applications
A system for authenticating mobile device users transparently is disclosed. This invention improves on the existing flaws by deriving encryption keys from...
US-9,477,824 Cloud control system and method for LAN-based controlled apparatus
A cloud control system for LAN-based controlled apparatus and method for the same is disclosed. The cloud control system includes a cloud server and a LAN...
US-9,477,820 Systems and methods for using unique device identifiers to enhance security
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can...
US-9,477,502 Parallel processing of data for an untrusted application
An untrusted application is received at a data center including one or more processing modules and providing a native processing environment. The untrusted...
US-9,474,099 Smart connectors and associated communications links
"Smart" connectors with embedded processors, measurement circuits and control circuits are disclosed for establishing a "contactless" radio frequency (RF)...
US-9,473,943 Methods and apparatus for managing data within a secure element
Apparatus and methods for managing and sharing data across multiple access control clients in devices. In one embodiment, the access control clients comprise...
US-9,473,935 Dynamic transmission of personal data to only trusted entities
Secure storage of important/relevant information on a device and/or internet cloud is facilitated, and enables automatic transmission of that important/relevant...
US-9,473,934 Wireless telecommunications network, and a method of authenticating a message
A method is provided of authenticating a message from a femtocell base station in a wireless telecommunications network comprising a security gateway and a...
US-9,473,920 Personal security alert and monitoring apparatus
A personal monitoring apparatus and methods of using the personal monitoring apparatus for contacting one or more third parties through wireless signals and/or...
US-9,473,533 Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
US-9,473,532 Data loss prevention (DLP) methods by a cloud service including third party integration architectures
Embodiments of the present disclosure include data loss prevention methods by a cloud-based service including third party integration architectures. The...
US-9,473,515 Method, device and system for securely downloading data
A method for data downloading is provided, including: sending a download request, and sending a security check request according to the download request;...
US-9,473,514 Efficient sensor data delivery
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
US-9,473,512 Methods and systems to implement fingerprint lookups across remote agents
The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect...
US-9,473,501 System and method for associating a universal user identification and a domain specific user identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
US-9,473,496 Dynamically mapping network trust relationships
In an embodiment, the method is comprising, receiving an access request, from an authenticator device, to grant a supplicant device access to a data network;...
US-9,473,493 Secure data communication
A system and a method for secure data communication over a network are described. In one embodiment, a method comprises generating a visual flashing code...
US-9,473,472 Enterprise cloud security gateway
A security virtual machine is provided in a network including a resource shared among two or more virtual machines. All data traffic from each virtual machine...
US-9,473,468 Methods and systems of data security in browser storage
Mechanisms and methods are provided for managing OAuth access in a database network system, and extending the OAuth flow of authentication to securely store the...
US-9,473,462 Method and system for configuring and securing a device or apparatus, a device or apparatus, and a computer...
A computer-implemented method for configuring and securing a first device, the method including performing a first check of the first device to determine the...
US-9,473,411 Scalable network apparatus for content based switching or validation acceleration
A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded...
US-9,473,351 System and method for automated provisioning of a wireless device
A processor and a system for automated provisioning of one or more wireless devices are provided. The processor includes one or more processing subsystems...
US-9,473,305 Computer program and method for biometrically secured, transparent encryption and decryption
A computer program for enabling secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out...
US-9,473,300 Authenticated sensor interface device
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data...
US-9,473,298 Simplifying IKE process in a gateway to enable datapath scaling using a two tier cache configuration
Computational complexity, specifically, cryptographic operations, is removed from the IKE(Internet Key Exchange) process in a VPN gateway appliance, thereby...
US-9,473,297 Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
Embodiments of the invention relate to efficiently storing encrypted data in persistent storage or passing to another data processing component. A downstream...
US-9,472,964 Interchangeable intelligent accessories for mobile devices
Techniques for an interchangeable modular design for mobile device accessories by separating a mobile device accessory into two modules are disclosed herein....
US-9,472,125 Reusable bolt electronic seal module with GPS/cellular phone communications and tracking system
An electronics circuit first portion is entirely within an electronics module housing, sensing and transmitting a tamper condition of a normally locked bolt....
US-9,472,067 Security devices and related features
Aspects of the present disclosure are directed to security-based apparatuses and methods. As may be implemented in accordance with one or more embodiments, an...
US-9,472,031 Security kiosk and system and method of controlling access using thereof
A security kiosk for controlling access to an area, includes a housing, a visitor identification reader, a data storage device, a controller, and a visitor...
US-9,471,916 Wireless establishment of identity via bi-directional RFID
A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID)....
US-9,471,805 Selective encryption of data stored on removeable media in an automated data storage library
In an automated data storage library, selective encryption for data stored or to be stored on removable media is provided. One or more encryption policies are...
US-9,471,800 Securing visual information on images for document capture
Techniques to provide secure access to data are disclosed. An indication that an operator is assigned to index a data value extracted from a document image is...
US-9,471,799 Method for privileged mode based secure input mechanism
A system and method are disclosed for securely receiving data from an input device coupled to a computing system. The system includes an interface configured to...
US-9,471,795 System and method providing permission based access to automotive computers
A Link device has a processor connected to an internal Link bus, a non-transitory memory, a digital device ID, one or both of firmware or software executing...
US-9,471,793 System on chip with embedded security module
An embedded security module includes a security processor, volatile and non-volatile memory, and an interface. The security processor includes transistors...
US-9,471,790 Remediation of security vulnerabilities in computer software
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each...
US-9,471,785 Systems and methods for secure boot ROM patch
A data processing system includes a boot read only memory (ROM) configured to store boot code; one time programmable (OTP) storage circuitry configured to store...
US-9,471,714 Method for increasing the security level of a user device that is searching and browsing web pages on the internet
A character string which is set in advance is stored (S4), and display data are obtained (S5), and link information is extracted from the obtained display data...
US-9,471,701 Methods and systems for secure in-network insertion of web content and web services
A method of web content and web services insertion is provided. The method includes receiving response data sent in response to request data, wherein the...
US-9,471,648 System, method and computer program product for displaying one or more data sets to a user
In accordance with embodiments, there are provided mechanisms and methods for displaying one or more data sets to a user. These mechanisms and methods for...
US-9,471,514 Mitigation of cyber attacks by pointer obfuscation
A method for protecting a computer includes identifying a first pointer in a data structure used by a computer program indicating a first memory address to be...
US-9,471,512 Secure memory system with fast wipe feature
A Flash-based storage system, card, and/or module comprises a Flash controller configured to encrypt the data pages of a page stripe by shuffling the data...
US-9,471,414 Service response detection and management on a mobile application
Techniques for detecting and addressing performance issues related to a mobile application are provided. Examples of performance issues include a backend...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.