Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,361,742 Highly secure combination lock system
A combination lock system has a lock body with a central portion and an surrounding portion on a face of the lock system. The central portion has a biometric...
US-9,361,612 Peer-to-peer transfer between mobile devices with coupled secure elements
A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication...
US-9,361,603 System and method for globally and securely accessing unified information in a computer network
A smartphone that includes a communications interface to communicate via one or more Internet communications channels is provided. The smartphone also includes...
US-9,361,481 Systems and methods for contextualized data protection
Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity, and security by enabling subjects to...
US-9,361,468 Method and system for granting access to secure data
Techniques described herein can be implemented as one or a combination of methods, systems or processor executed code to form embodiments capable of improved...
US-9,361,465 Privacy-enhanced car data distribution
In accordance with some embodiments, data may be collected from vehicles, and then reported to various subscribers with different levels of access privileges...
US-9,361,462 Associating a signing key with a software component of a computing platform
A method and system is provided for operatively associating a signing key with a software component of a computing platform. The computing platform includes a...
US-9,361,454 Methods for restricting resources used by an application based on a base profile and an application specific...
In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted...
US-9,361,440 Secure off-chip processing such as for biometric data
In a biometric sensor system and method, storage of acquired biometric data and/or processing of that data may be shifted from specialized secure processing...
US-9,361,265 Method and device for integrating a device into a network
A method and a server for integrating a device into a network, a first device identification of the device is detected being a reading device authorized for...
US-9,361,178 Method and device for improving the data transmission security in a serial data transmission having flexible...
A method is provided for serial data transmission in a bus system having at least two bus subscribers, which exchange messages via the bus, the send access to...
US-9,361,170 Method for checking data consistency in a system on chip
The invention aims to provide a method and a system on chip able to detect at once hardware and software errors to prevent manipulations for retrieving...
US-9,361,089 Secure patch updates of a virtual machine image in a virtualization data processing system
Virtual Machine (VM) images in a virtualized environment are updated through the use of patches. A virtualization data processing system includes a hypervisor...
US-9,361,085 Systems and methods for intercepting, processing, and protecting user data through web application pattern...
Systems and methods of intercepting user data of a web application are provided. After web application resources are obtained for execution on a client device,...
US-9,357,394 System and method for selecting means for intercepting network transmissions
Disclosed are systems and methods for selecting means for intercepting network transmissions. An example system includes a data collection module configured to...
US-9,357,381 Security management in M2M area network
The disclosure is related to a machine to machine (M2M) device and a security management method thereof. The M2M device includes an identification circuit. The...
US-9,357,332 Near field communication application identification routing in card emulation
A near field communications (NFC) device is disclosed that interacts with other NFC devices to exchange information and/or the data. The NFC device can include...
US-9,357,331 Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication
Systems and apparatuses for a secure mobile cloud framework (referred to as MobiCloud) for mobile computing and communication are disclosed. Embodiments of...
US-9,357,102 Systems and methods of securing operational information associated with an imaging device
The invention is directed to a tamper-evident method of encrypting data relating to one or more print cartridges installed in an imaging device that includes...
US-9,356,985 Streaming video to cellular phones
A method, system, and computer program product for deploying data to a web server for streaming video to a mobile device. The method can include receiving a...
US-9,356,969 Technologies for multi-factor security analysis and runtime control
Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code...
US-9,356,967 Secure on-demand supply method and system and traffic type acquisition method
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a...
US-9,356,940 Security and access system based on multi-dimensional location characteristics
An invention is provided for system security and access based on multi-dimensional location characteristics. The invention includes collecting contextual...
US-9,356,926 Security system
A security system includes an interface, a main computer, and an application server. The interface enables a user to access a remote document related to a...
US-9,356,925 Apparatus and method for providing location based security for communication with a remote device
A method for providing location based security for communication between a remote device and a mobile device having a global positioning system receiver for...
US-9,356,910 Applying a packet routing policy to an application session
A security gateway includes packet routing policies, each including a host network address, an application network address, and a forwarding interface. In...
US-9,356,787 Secure communication architecture including sniffer
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption...
US-9,356,786 Method for encrypting a plurality of data in a secure set
A server-implemented method encrypting at least two pieces of indexed data as lists of elements, each element belonging to a finite set of indexed symbols on an...
US-9,356,781 Methods and apparatus for authenticating data as originating from a storage and processing device and for...
Techniques are described for using unique features of a storage medium for authentication of data as originating from the storage medium, and also for...
US-9,356,552 Motor drive system data interface system and method
A motor drive system includes a motor drive processor, a motor drive memory component, a server, and a display that displays a machine readable code, wherein...
US-9,355,545 Secure optionally passive RFID tag or sensor with external power source and data logging
A secure optionally passive RFID tag or sensor system comprises a passive RFID tag having means for receiving radio signals from at least one base station and...
US-9,355,426 Hardware-enforced, always-on insertion of a watermark in a video processing path
A method, apparatus, article of manufacture, and a memory structure for inserting a watermark in a media program is described. In an exemplary embodiment, the...
US-9,355,399 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-9,355,282 Using multiple display servers to protect data
A first display server and a second display server execute on a processing device. The first display server provides a secure environment for data presented in...
US-9,355,280 Apparatus and method for providing hardware security
A technique to provide a hardware security module that provides a secure boundary for retention of a secure key within the secure boundary and prevention of...
US-9,355,279 Multi-tenancy architecture
A system includes a security device, configured for cryptographic processing, coupled to receive incoming data from a plurality of data sources (e.g., data from...
US-9,355,270 Security configuration systems and methods for portal users in a multi-tenant database environment
A computer-implemented system and method includes method includes receiving a data request for data in a database from a user; determining if the user is an...
US-9,355,261 Secure data management
The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory...
US-9,355,260 Method and system for securing access to configuration information stored in universal plug and play data models
A method and system for securing access to configuration information stored in universal plug and play data models are provided. The method includes receiving a...
US-9,355,254 Apparatus, system and method for preventing data loss
A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may...
US-9,355,250 Method and system for rapidly scanning files
The present embodiments provide a method and system for rapidly scanning a file, wherein the method includes obtaining a data packet, the data packet comprising...
US-9,355,224 System and method for dynamic adjustment of expiration date for authorization key for antivirus products
A system for a dynamic adjustment of expiration date of an authorization key, the system comprising: a security product that will be installed on a...
US-9,355,157 Information targeting systems and methods
The present disclosure relates generally to systems and methods for the secure management of electronic information relating to a user. In certain embodiments,...
US-9,355,135 Data movement from a database to a distributed file system
Provided are techniques for data movement. An activity is created that overrides existing security, that is associated with a user, that defines one or more...
US-9,355,048 Method for implementing secure data channel between processor and devices
Apparatuses, systems, and methods are directed to securely store, transfer, and/or process data especially sensitive data sent from input devices to processors....
US-9,354,985 Data processing device and data processing method
Embodiments of the present invention provide a data processing device and a data processing method. In the data processing device and the data processing method...
US-9,354,927 Securing virtual machine data
One embodiment of the present invention is a method including: (a) representing virtual primary disk data and state data of a virtual machine in a unit of...
US-9,354,674 Transportation, storage and stabilization device for electronic equipment
An equipment saddle is provided. The equipment saddle may include a plurality of cases attached to a drapable skirt. Each case forms a compartment for retaining...
US-9,351,167 SMS botnet detection on mobile devices
Technologies for mobile device security are disclosed. A described technique includes launching a monitoring application that has a priority receiver attribute...
US-9,351,163 Automatic sanitization of data on a mobile device in a network environment
A method is provided in one example embodiment and includes establishing a network connection to a central security system in a central network, receiving a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.