Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,881,184 Authenticity-assured data gathering apparatus and method
Data is captured by a data capture apparatus in a manner to ensure authenticity of the data to the data capture apparatus. Transducer signaling is generated in...
US-9,881,183 System and method for recovering from an interrupted encryption and decryption operation performed on a volume
Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An...
US-9,881,177 Systems and methods for a cryptographic file system layer
The systems and methods disclosed herein transparently provide data security using a cryptographic file system layer that selectively intercepts and modifies...
US-9,881,176 Fragmenting data for the purposes of persistent storage across multiple immutable data structures
Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields;...
US-9,881,164 Securing data
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for securing data. One of the methods includes receiving, by the...
US-9,881,161 System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof
A system on chip is provided. The system on chip includes a first memory to store a plurality of encryption keys, a second memory, a third memory to store an...
US-9,881,159 Workload execution systems and methods
In one embodiment, a method is executed by a computer system. The method includes receiving information related to a platform-portable workload, the information...
US-9,881,033 Intelligent electrical distribution grid control system data
Aspects of a multi-level electrical distribution control system associated with an electrical distribution grid are disclosed. Data access and processing across...
US-9,881,030 Distributed archive system, data archive device, and data restoring device with improved restoration and security
A system for a distributed archive and data restoration which achieves both high-speed processing and security is provided. A random number is generated by a...
US-9,879,469 Centrally controlled safe management system
A cash management system utilizes a cloud computing model wherein a cloud of one or more servers may be locally networked or may be geographically dispersed and...
US-9,875,626 Methods and systems for determining a location of a container by tracking a SIM card associated with the container
Systems and methods of securing chattels are provided. Motion of a first container can be measured by a sensor over an interval of time and compared to motion...
US-9,875,607 Methods and apparatus for providing secure logon to a gaming machine using a mobile device
A gaming system compatible with patron-controlled portable electronic devices, such as smart phones or tablet computers, is described. When a transaction is...
US-9,875,474 Method for securing a transaction performed by bank card
A method is provided for securing a transaction made by bank card, the transaction involving a remote provision, by a user, of data existing in a bank card in...
US-9,875,376 Sensitive data aliasing
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed...
US-9,875,374 System and method for collecting, storing, and securing data
A computer system for collecting, securing, storing, retrieving, and disposing data includes an input that receives data from one or more data capture devices,...
US-9,875,370 Database server and client for query processing on encrypted data
Methods, systems, apparatuses, and computer program products are provided for secure handling of queries by a data server (DS) and a database application (DA)....
US-9,875,354 Apparatus and method for enhancing security of data on a host computing device and a peripheral device
A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication...
US-9,875,348 E-learning utilizing remote proctoring and analytical metrics captured during training and testing
A device configured to utilize training techniques and to gather information while training and administering certification examinations. Certification...
US-9,875,194 Security system for external data storage apparatus and control method thereof
A security system for an external data storage apparatus and control method thereof are disclosed. The system utilizes a preset identification (ID) and input ID...
US-9,872,167 Method of managing several profiles in a secure element
The invention is a method for managing communication between a secure element and a device. The secure element comprises a physical communication interface and...
US-9,871,920 Securely and efficiently transferring sensitive information via a telephone
An apparatus includes a communications module that establishes a verbal communication between an automated attendant of a company and a customer through an...
US-9,871,852 Monitoring system with message forwarding, a method, and a computer program
Monitoring installations for buildings, building complexes, open spaces or other monitoring areas can comprise a plurality of system components. These system...
US-9,871,851 Migrating private infrastructure services to a cloud
Implementations are provided herein for the migration of known infrastructure services, such as those existing on a private cloud infrastructure, to a public...
US-9,871,819 Zone-based security architecture for intra-vehicular wireless communication
Systems and methods provide secure and wireless intra-vehicular communication. An intra-vehicular communication system has a secured network segment including a...
US-9,871,816 Systems and methods for security management of multi-client based distributed storage
There is provided a method of maintaining a security risk level of data objects stored in a distributed system, comprising: estimating a current security risk...
US-9,871,814 System and method for improving security intelligence through inventory discovery
A system for monitoring devices in a network comprising a coordinator operating on a first processor and configured to detect a plurality of active devices and...
US-9,871,805 User authentication
A method, system, server processing system and computer readable medium for authenticating a user attempting to access a secure environment is disclosed. In one...
US-9,871,797 Information security apparatus and methods for credential dump authenticity verification
In some embodiments, an apparatus includes a memory, storing processor-executable instructions, blacklist terms, and credential dump records, and a processor....
US-9,871,790 Identification method of an entity
The present invention relates to identification method of an entity executed by an identification system from indexed distance data (d.sub.1, . . . , d.sub.n)...
US-9,871,774 Secured file transfer management on augmented reality (AR) and virtual reality (VR) devices
In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated...
US-9,871,771 Cryptographic security profiles
Two endpoint devices communicate with one another in a secure session by negotiating encrypted communications at initial establishment of the session. Each...
US-9,871,770 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,871,768 IPv6 to IPv4 data packet migration in a trusted security zone
Systems and methods discussed herein relate to enabling communications between IPv4 and IPv6 hosts using a communication channel in a trusted security zone...
US-9,871,766 Secure path determination between devices
Methods, network controllers, and machine-readable and executable instructions are provided to determine a secure path between a source device and a destination...
US-9,871,660 Method for certifying and authentifying security documents based on a measure of the relative variations of the...
Methods for certifying a security document comprising the steps of: a) selecting a set of unique characteristics, obtained as the result of the variations in...
US-9,871,659 Data transmission unit for a vehicle
A method for transmitting data between a vehicle and a terminal, in which data to be transmitted are transmitted on the basis of at least one digital signature...
US-9,870,694 Networked security cameras and automation
Apparatuses, techniques, and methods for a security and/or automation system are described. In some cases, methods may include obtaining data from a first...
US-9,870,665 Apparatus, system and method for vehicle access and function control utilizing a portable device
A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to...
US-9,870,659 Cryptographic key management via a computer server
Some embodiments include a computer server. The computer server can be configured to: add a security system associated with a user account; provision one or...
US-9,870,508 Securely authenticating a recording file from initial collection through post-production and distribution
The technology disclosed relates to data captured in streams from sensors. Streams often are edited, especially video and audio data streams. In particular, the...
US-9,870,490 Apparatus and method for an antitheft secure operating system module
An apparatus and method for a secure operating system module are provided. The method includes receiving an activation signal to enable a secure OS module, in...
US-9,870,488 Method and apparatus for securing programming data of a programmable device
Circuitry and methods prevent unauthorized programming, or reprogramming, of a programmable device, by requiring a signature in the configuration data to match...
US-9,870,478 Data protection for storage device
A method for protecting data on a first storage device from unauthorized access is provided. The method includes copying a data map, such as a file allocation...
US-9,870,477 Security engine for a secure operating environment
The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a...
US-9,870,471 Computer-implemented method for distilling a malware program in a system
A computer-implemented method for distilling a malware program in a system is disclosed. The computer-implemented method includes steps of receiving a known...
US-9,870,459 Physical token-less security screening using biometrics
In physical token-less security screening using biometrics, a person provides biometric data to a security computing device as part of a security screening. The...
US-9,870,414 Secure deletion operations in a wide area network
Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a...
US-9,870,407 Automated and delegated model-based row level security
Business groups are created to secure business entities of a BI data model. In one aspect, a user to be secured is selected and a business group of the BI model...
US-9,870,324 Isolating guest code and data using multiple nested page tables
A hypervisor provides a guest operating system with a plurality of protection domains, including a root protection domain and one or more secure protection...
US-9,870,166 Securely sharing cached data
Various embodiments of a system and method for securely caching and sharing image data. A process can generate image data and store the image data into the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.