Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,313,660 Apparatus and method for secure provisioning of a communication device
A system that incorporates the subject disclosure may perform, for example, receiving an over-the-air programming message that includes programming data for use...
US-9,313,657 Method and system for creating a mobile internet protocol version 4 connection
A method for creating a unique and secure mobile internet protocol version 4 connection for a packet data network is provided. The method includes generating an...
US-9,313,532 Method and system for securely performing callbacks in a content distribution system
A system for securely communicating callback signals to a head end includes a callback server and a user device communicating a request to open a callback...
US-9,313,458 Downloadable security and protection methods and apparatus
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional...
US-9,313,354 Output system for secure image processing, image processing apparatus, and output method thereof
An output system includes an identification information registration unit configured to register identification information of a terminal device; a transmission...
US-9,313,313 Proximity access and/or alarm apparatus
A method and system for securing portable electronic devices as well as access to data on the portable electronic device is described. The method consists of a...
US-9,313,232 System and method for data mining and security policy management
A method is provided in one example and includes generating a query for a database for information stored in the database. The information relates to data...
US-9,313,227 Gateway-based audit log and method for prevention of data leakage
A system and method for prevention of data leakage, the system comprising: a server configured to receive and transmit user activity commands; a protection...
US-9,313,196 System and method for secure access of a remote system
A system and method for providing a user with secure access to devices operatively connected to a network comprising at least one processing device that has...
US-9,313,192 Communications hub for use in life critical network
Secured communications between patient portable communicators (PPC) and a central authority (CA) via an unsecured network are implemented using software...
US-9,313,179 Mixing secure and insecure data and operations at server database
Processing a query, includes, at a client, receiving a user-generated query having a plurality of recognizable terms, securing the user-generated query to...
US-9,313,175 Method and system for mapping between connectivity requests and a security rule set
A system capable of automated mapping between a connectivity request and an ordered security rule-set and a method of operating thereof. The system includes an...
US-9,313,171 Path selection in a multi-service and multi-tenant secure cloud environment
A device and method are provided to provide multi-exit firewall capabilities for cloud server or cloud service deployments without prior knowledge of...
US-9,313,030 Method and apparatus for secure ad hoc group device-to-device communication in information-centric network
Various disclosed embodiments include methods, devices and systems establishing secure discovery and secure communication in an ad hoc information-centric...
US-9,313,022 Homomorphic cryptography modeling in support of privacy policies
Data privacy is becoming increasingly important and, in some jurisdictions, required. Access to private data can be controlled by forcing all access to go...
US-9,312,992 Method and apparatus for data security and automatic repeat request implementation in a wireless communication...
A method and apparatus for implementing data security and automatic repeat request (ARQ) in a wireless communication system are disclosed. Cipher entities are...
US-9,312,926 System and method for NFC peer-to-peer authentication and secure data transfer
A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted...
US-9,312,861 Protecting data from decryption from power signature analysis in secure applications
Disclosed is a novel circuit able to generate any logic combination possible as a function of the input logic signals. The circuit is described as a 2 input...
US-9,312,653 Rotatable power center for a work surface
A rotatable power center is configured for installation along a work surface or the like, and includes an outer housing and a pivotable inner housing having one...
US-9,312,269 Semiconductor device
A semiconductor device with a novel structure in which storage capacity needed for holding data can be secured even with miniaturized elements is provided. In...
US-9,311,775 Data import/export architecture between online properties
A secure architecture can provide a bridge between the utility and entertainment value of online properties. An architecture that employs an internal entity...
US-9,311,586 Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active RFID...
A real-time automated data security system protects both data and devices from loss, theft, and unauthorized access or activity. A miniature active RFID circuit...
US-9,311,506 Storing and transmitting sensitive data
A method for storing and transmitting data across a computer network to one or more destinations is disclosed including storing source data on a secure data...
US-9,311,505 Method and apparatus for providing abstracted user models
An approach is provided for providing abstracted user models in accordance with one or more access policies. A model platform determines an ontology for...
US-9,311,504 Anti-identity-theft method and hardware database device
A hardware device (TCK) for securing data in a database accessed through an Internet server is presented. The TCK controls access to its internal database...
US-9,311,500 Data security using request-supplied keys
Requests are submitted to a request processing entity where the requests include a cryptographic key to be used in fulfilling the request. The request...
US-9,311,499 Data security system and with territorial, geographic and triggering event protocol
The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a...
US-9,311,496 Privacy screen-based security
A system for privacy screen-based security comprises an input interface and a processor. The input interface is configured to receive authentication...
US-9,311,494 Secure search method and secure search device
In search that uses searchable code, the search query and the secure index is collated in round-robins fashion, registering the required secure index and a...
US-9,311,491 Systems, methods, and computer program products for securely managing data on a secure element
Systems, methods, and computer program products are provided for managing applets. A first request to personalize the first applet is received over a...
US-9,311,482 Inoculator and antibody for computer security
In an embodiment of the invention, a method includes: determining, in a computer, an area where an undesired computer program will reside; and providing a data...
US-9,311,369 Virtual masked database
Systems, methods, and other embodiments associated with virtual masked databases are described. One example system includes a masking logic to mask an unmasked...
US-9,311,316 Infrastructure identification of available platforms for migration in place
Technologies related to migration in place are generally described. In some examples, software and/or data associated with a platform customer can be "migrated"...
US-9,311,255 Multi-layer content protecting microcontroller
The present invention relates to a microcontroller designed for protection of intellectual digital content. The microcontroller includes a secure CPU, a...
US-9,311,254 Method and apparatus for an improved access system
A method and apparatus to enable a user to send an action message including secure credential is described. The system comprises a receiving logic to receive...
US-9,311,229 System and method for managing flash memory
A system and method for flash memory management is provided. In particular, the system and methods herein provide for management of flash memory, particularly...
US-9,311,135 Method for generating universal objects identifiers in distributed multi-purpose storage systems
A computer implemented method and system for generating secure universal object identifiers on a multipurpose storage system is disclosed. According to one...
US-9,311,031 Approach for printing policy-enabled electronic documents using locked printing and a shared memory data structure
According to approach for printing policy-enabled electronic documents, when a locked print module determines that an electronic document contained in the PDF...
US-9,310,227 Multi-channel rotary encoder
Method for operating a multi-channel rotary encoder comprising at least one printed circuit board on which one or a plurality of functional units (1, 1a, 1b,...
US-9,310,147 Secure smartphone-operated gun trigger lock
A gun trigger-locking device which is configured to be manually installed on a gun with a trigger-blocking member disposed behind the trigger to prevent the gun...
US-9,307,403 System and method for NFC peer-to-peer authentication and secure data transfer
A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted...
US-9,307,317 Wireless programmable microphone apparatus and system for integrated surveillance system devices
A wireless programmable microphone apparatus and related devices are disclosed. The programmable wireless microphone apparatus may be used by a law enforcement...
US-9,307,289 Networked personal video storage and delivery
A portable video delivery device includes data storage, a secure processor, and a wireless network interface that acts as an access point for a secure personal...
US-9,307,205 System and method for utilizing a secured service provider memory
A system and method for utilizing a secured service provider memory are disclosed. An electronic device is associated with a subscriber and is in communication...
US-9,307,091 Method and apparatus for the secure storage of audio signals
In one embodiment, a method, system and apparatus for recording audio is provided so that the recording can be authenticated. The system may be implemented as a...
US-9,307,028 Device for archiving handwritten information
There is provided an electronic pen device configured to be used with a remote secure server for registering handwritten signatures, the secure server...
US-9,306,980 Image processing apparatus that configures settings of information security policy, method of controlling the...
An image processing apparatus which enables a user to change the user mode while maintaining the state compliant with the information security policy. A network...
US-9,306,973 Defending against browser attacks
In one example the opening of a primary browser to a URL may be detected, a reference browser may then be opened to the same URL, data input to respective data...
US-9,306,972 Method and system for prevention of malware infections
A system and method for prevention of malware infections, the system comprising: a secured server configured to authenticate a user and issue an identifier (ID)...
US-9,306,962 Systems and methods for classifying malicious network events
A system for classifying events on a computer network includes an event clustering engine for receiving event and log data related to identifiable actors from a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.