Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,311,775 Data import/export architecture between online properties
A secure architecture can provide a bridge between the utility and entertainment value of online properties. An architecture that employs an internal entity...
US-9,311,586 Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active RFID...
A real-time automated data security system protects both data and devices from loss, theft, and unauthorized access or activity. A miniature active RFID circuit...
US-9,311,506 Storing and transmitting sensitive data
A method for storing and transmitting data across a computer network to one or more destinations is disclosed including storing source data on a secure data...
US-9,311,505 Method and apparatus for providing abstracted user models
An approach is provided for providing abstracted user models in accordance with one or more access policies. A model platform determines an ontology for...
US-9,311,504 Anti-identity-theft method and hardware database device
A hardware device (TCK) for securing data in a database accessed through an Internet server is presented. The TCK controls access to its internal database...
US-9,311,500 Data security using request-supplied keys
Requests are submitted to a request processing entity where the requests include a cryptographic key to be used in fulfilling the request. The request...
US-9,311,499 Data security system and with territorial, geographic and triggering event protocol
The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a...
US-9,311,496 Privacy screen-based security
A system for privacy screen-based security comprises an input interface and a processor. The input interface is configured to receive authentication...
US-9,311,494 Secure search method and secure search device
In search that uses searchable code, the search query and the secure index is collated in round-robins fashion, registering the required secure index and a...
US-9,311,491 Systems, methods, and computer program products for securely managing data on a secure element
Systems, methods, and computer program products are provided for managing applets. A first request to personalize the first applet is received over a...
US-9,311,482 Inoculator and antibody for computer security
In an embodiment of the invention, a method includes: determining, in a computer, an area where an undesired computer program will reside; and providing a data...
US-9,311,369 Virtual masked database
Systems, methods, and other embodiments associated with virtual masked databases are described. One example system includes a masking logic to mask an unmasked...
US-9,311,316 Infrastructure identification of available platforms for migration in place
Technologies related to migration in place are generally described. In some examples, software and/or data associated with a platform customer can be "migrated"...
US-9,311,255 Multi-layer content protecting microcontroller
The present invention relates to a microcontroller designed for protection of intellectual digital content. The microcontroller includes a secure CPU, a...
US-9,311,254 Method and apparatus for an improved access system
A method and apparatus to enable a user to send an action message including secure credential is described. The system comprises a receiving logic to receive...
US-9,311,229 System and method for managing flash memory
A system and method for flash memory management is provided. In particular, the system and methods herein provide for management of flash memory, particularly...
US-9,311,135 Method for generating universal objects identifiers in distributed multi-purpose storage systems
A computer implemented method and system for generating secure universal object identifiers on a multipurpose storage system is disclosed. According to one...
US-9,311,031 Approach for printing policy-enabled electronic documents using locked printing and a shared memory data structure
According to approach for printing policy-enabled electronic documents, when a locked print module determines that an electronic document contained in the PDF...
US-9,310,227 Multi-channel rotary encoder
Method for operating a multi-channel rotary encoder comprising at least one printed circuit board on which one or a plurality of functional units (1, 1a, 1b,...
US-9,310,147 Secure smartphone-operated gun trigger lock
A gun trigger-locking device which is configured to be manually installed on a gun with a trigger-blocking member disposed behind the trigger to prevent the gun...
US-9,307,403 System and method for NFC peer-to-peer authentication and secure data transfer
A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted...
US-9,307,317 Wireless programmable microphone apparatus and system for integrated surveillance system devices
A wireless programmable microphone apparatus and related devices are disclosed. The programmable wireless microphone apparatus may be used by a law enforcement...
US-9,307,289 Networked personal video storage and delivery
A portable video delivery device includes data storage, a secure processor, and a wireless network interface that acts as an access point for a secure personal...
US-9,307,205 System and method for utilizing a secured service provider memory
A system and method for utilizing a secured service provider memory are disclosed. An electronic device is associated with a subscriber and is in communication...
US-9,307,091 Method and apparatus for the secure storage of audio signals
In one embodiment, a method, system and apparatus for recording audio is provided so that the recording can be authenticated. The system may be implemented as a...
US-9,307,028 Device for archiving handwritten information
There is provided an electronic pen device configured to be used with a remote secure server for registering handwritten signatures, the secure server...
US-9,306,980 Image processing apparatus that configures settings of information security policy, method of controlling the...
An image processing apparatus which enables a user to change the user mode while maintaining the state compliant with the information security policy. A network...
US-9,306,973 Defending against browser attacks
In one example the opening of a primary browser to a URL may be detected, a reference browser may then be opened to the same URL, data input to respective data...
US-9,306,972 Method and system for prevention of malware infections
A system and method for prevention of malware infections, the system comprising: a secured server configured to authenticate a user and issue an identifier (ID)...
US-9,306,962 Systems and methods for classifying malicious network events
A system for classifying events on a computer network includes an event clustering engine for receiving event and log data related to identifiable actors from a...
US-9,306,959 Dual bypass module and methods thereof
A dual bypass module for managing an integrated secured network environment is provided. The module includes network ports that receive and transmit data...
US-9,306,956 File system level data protection during potential security breach
Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file...
US-9,306,940 Mitigating risk of account enumeration
Technology is disclosed for mitigating account enumeration and thus enhances network security. The technology can receive from a client computing device a...
US-9,306,933 Ensuring network connection security between a wrapped app and a remote server
A network connection between an app on a mobile device and a remote server is either enabled or denied based on whether a security wrapped app can verify that...
US-9,306,928 System and method for associating a universal user identification and a domain specific user identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
US-9,306,917 Transparent encryption/decryption gateway for cloud storage services
A mechanism is provided for secure data storage in a distributed computing system by a client of the distributed computing system. A gateway device intercepts a...
US-9,306,915 Systems and methods for secure file transfers
Embodiments of the disclosure can include systems and methods for secure file transfers. The onsite monitoring system secure file transfer solution can allow...
US-9,306,840 Securing software defined networks via flow deflection
A flow deflection capability is provided for deflecting data flows within a Software Defined Network (SDN) in order to provide security for the SDN. A flow...
US-9,306,839 IEEE 802.11U failover for a mesh network
The present invention provides IEEE 802.11u failover for a mesh network that contains a root node coupled to a network operations center through a backhaul...
US-9,306,744 Video cryptography system and method
A system and method implementing stenographic cryptography in a video data stream (VDS) is disclosed that embeds secret video data (SVD) in a graphical user...
US-9,306,738 Managed secure computations on encrypted data
The subject disclosure is directed towards secure computations of encrypted data over a network. In response to user desired security settings with respect to...
US-9,306,737 Systems and methods for secure handling of data
The methods and systems described herein provide for secure implementation of external storage providers in an enterprise setting. Specifically, the present...
US-9,306,632 Apparatus, system and method of establishing communication between an application operating on an electronic...
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
US-9,306,604 Wedge shaped corner transmitter
A corner mounted device is provided. The corner mounted device includes a housing and a data transmitter within the housing. The housing may include a first...
US-9,306,344 Computing device connectors
Computing device connectors are described. In one or more implementations, a connector includes one or more communication contacts configured to support...
US-9,305,401 Real-time 3-D video-security
An image analysis technology that enables real-time fully 3-dimensionally integrated reconstruction of the live video-data derived from CCTV system's multiple...
US-9,305,260 System and method for distinguishing human swipe input sequence behavior
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
US-9,305,189 Ruggedized, compact and integrated one-way controlled interface to enforce confidentiality of a secure enclave
A rugged, integrated network interface appliance for ensuring secure data transfer comprising send-only network interface circuitry comprising a microprocessor,...
US-9,305,187 Data security management systems and methods
Data security management system and methods are provided. First, a first system having a management authority is provided. The first system displays an input...
US-9,305,185 Method and apparatus for securing programming data of a programmable device
Circuitry and methods prevent unauthorized programming, or reprogramming, of a programmable device, by requiring a signature in the configuration data to match...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.