Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,679,126 Decryption device, method for decrypting and method and system for secure data transmission
A decryption device for decrypting a document encrypted using biometric information of an intended receiver of the document is provided. The decryption device...
US-9,679,118 Method and system for secure distribution of selected content to be protected
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
US-9,678,681 Secured multi-tenancy data in cloud-based storage environments
A mechanism is provided for multi-tenancy data security. A storage device receives a request for storage from a client device. Responsive to the request for...
US-9,674,699 System and methods for secure communication in mobile devices
A system and a method for secure communication in a mobile computing device involve obtaining, by a first program installed on the mobile computing device, an...
US-9,674,201 Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets
Techniques for unobtrusively protecting against large-scale data breaches over time are described. A security gateway coupled between clients and servers...
US-9,674,146 Network security module for Ethernet-receiving industrial control devices
A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The...
US-9,674,142 Monitoring network traffic
The disclosure is related to monitoring data traffic of user equipment through a monitoring node. A monitoring node may receive a data packet from user...
US-9,672,384 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-9,672,347 Integrity for security audit logs
Methods, systems, and computer-readable storage media for storing event data in an audit log file. Implementations include actions of receiving event data,...
US-9,672,345 Method and apparatus for making a decision on a card
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and...
US-9,672,189 Methods for effective network-security inspection in virtualized environments
The present invention discloses methods for effective network-security inspection in virtualized environments, the methods including the steps of: providing a...
US-9,672,052 Secure inter-process communication
Among other disclosed subject matter, a system includes a secure execution domain configured to execute trusted processes. The system also includes a hardware...
US-9,671,953 Systems and methods using drawings which incorporate biometric data as security information
Systems and methods using drawings as security information are disclosed. According to an aspect, a computing device may include a touchscreen display...
US-9,669,508 Grinding wheel with identification tag
A grinding wheel assembly for use in a sharpening system includes a grinding wheel configured to be mounted in the sharpening system to carry out sharpening...
US-9,669,330 WWTP sensor cartridge
Embodiments describe apparatuses, systems and methods for utilizing a configurable WWTP container having a removable sensor/controller cartridge. Said removable...
US-9,667,723 High performance IP processor using RDMA
An architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide...
US-9,667,698 Secure port forwarding to access data between public processing locations and on-premise components
A method for transmitting data from an on-premise component to an off-premise computer image includes: sending a message from the off-premise computer image to...
US-9,667,659 Determining security factors associated with an operating environment
Embodiments of the present invention disclose a method, computer program product, and system for determining security factors associated with an operating...
US-9,667,654 Policy directed security-centric model driven architecture to secure client and cloud hosted web service...
A policy directed, security-centric model driven architecture is described to secure internal web services, such as those implementing service-oriented...
US-9,667,639 Systems and methods for detecting fraudulent electronic communication
Systems and methods are presented for receiving a plurality of request messages to analyze electronic communications. For each request message of the plurality...
US-9,667,627 Airport security check system and method therefor
A decryption system for decrypting user identification information encrypted on a storage device associated with a user identity document is disclosed. The...
US-9,667,621 Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
US-9,667,421 Federated key management
A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by...
US-9,667,338 Multiband wireless data transmission between aircraft and ground systems
Provided are methods and systems for multiband wireless data transmission between aircraft and ground systems. The transmission uses different wavelength...
US-9,667,316 Aircraft data transmission using phase separation
Provided are methods and systems for terrestrial data transmission between aircrafts and external networks connected to gates at airports. This type of data...
US-9,665,965 Video-associated objects
A companion object to a media player, such as a video player, is responsive to an event associated with the video player. The event may be associated with the...
US-9,665,739 Display device having security function
Display device includes timing controller, display panel, data driver, and scan driver. The timing controller includes an authentication processing unit...
US-9,665,704 Method and system for providing password-free, hardware-rooted, ASIC-based, authentication of human to a...
Biometric data are obtained from a biometric sensor on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The...
US-9,665,654 Secure connections in an interactive analytic visualization infrastructure
A method and system is described securely capturing up-to-date data and presenting the up-to-date data in an analytic visualization. An update server receives a...
US-9,665,638 Systems and methods for secure storage of user information in a user profile
Systems and methods are provided for securely storing information of a user in a user profile to prevent access to the information and minimize the amount of...
US-9,665,503 Efficient packet handling, redirection, and inspection using offload processors
A packet handling system is disclosed that can include at least one main processor; a plurality of offload processors connected to a memory bus and configured...
US-9,665,307 Incremental continuous data protection
Systems and techniques are provided for incremental Continuous Data Protection (iCDP) as a process to secure frequent, and space efficient, versions of...
US-9,665,081 Intelligent power utilization system and method for parks
A system for intelligent electric power utilization of park and a method thereof are provided. The system includes an acquisition system, a data processing...
US-9,662,871 Apparatus and method for application of sticky back material
An automatic applicator of a sticky back material to a printing sleeve is disclosed. The applicator includes a controller that is programmable with data...
US-9,661,016 Data center infrastructure management system incorporating security for managed infrastructure devices
A system is disclosed for enhancing detection of a security threat to a managed infrastructure device operating within a data center. The system may have a data...
US-9,660,998 Secure proxy
Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy...
US-9,659,290 Financial transaction system
A system and method for conducting a financial transaction is disclosed. The system includes a first memory location embedded in a personal portable device. The...
US-9,659,184 Multi-identity graphical user interface for secure file sharing
In the approaches described herein, a data file storage service may control access to file system objects using corresponding "personal" or organization-related...
US-9,654,465 Software-defined network threat control
In Software-Defined Network (SDN), a trust controller and trust processor exchange hardware-trust data over an SDN southbound interface to maintain ...
US-9,654,450 Computerized method and system for managing secure content sharing in a networked secure collaborative exchange...
In embodiments of the present invention, improved capabilities are described for securely sharing computer data content between business entities as managed...
US-9,654,296 Handling sensor data
An apparatus, a system and a method for securing sensor data by a security engine circuitry of a system on chip (SoC). For example, the security engine may...
US-9,654,256 Method of utilizing a relay node in wireless communication system
The present invention relates to a wireless communication system and a user equipment (UE) providing wireless communication services, and more particularly, a...
US-9,653,004 Systems and methods for downloading code and data into a secure non-volatile memory
A method for downloading information into a secure non-volatile memory of a secure embedded device (SED) during a manufacturing or personalization process. The...
US-9,652,798 Systems and methods for identifying product recommendations based on investment portfolio data
The disclosed embodiments include, for example, systems and methods for providing recommendations of one or more alternative products to a user based on...
US-9,652,635 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-9,652,622 Data security utilizing disassembled data structures
Various examples are directed to machines and methods for disassembling and reassembling data structures. An ordered set of functions may be applied to a data...
US-9,652,542 Securely extending analytics within a data warehouse environment
A vendor is authenticated for use of a retailer's data warehouse and limited access rights are assigned to the vendor for access. The vendor accesses a...
US-9,648,355 Adaptive security camera image compression apparatus and method of operation
A lossy compression method optimizes bandwidth and storage for a security surveillance network. An appliance on a local network attached to event capture...
US-9,648,288 Information processing system and method, information processing apparatus, image-capturing device and method,...
A feature extracting unit obtains sensor data from a plurality of sensors to calculate each feature. When an event determining unit determines the occurrence of...
US-9,648,042 Apparatus and method for managing security content using virtual folder
Provided are an apparatus and method for managing security contents using a virtual folder. The apparatus for managing security contents includes a data control...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.