Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,306,632 Apparatus, system and method of establishing communication between an application operating on an electronic...
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
US-9,306,604 Wedge shaped corner transmitter
A corner mounted device is provided. The corner mounted device includes a housing and a data transmitter within the housing. The housing may include a first...
US-9,306,344 Computing device connectors
Computing device connectors are described. In one or more implementations, a connector includes one or more communication contacts configured to support...
US-9,305,401 Real-time 3-D video-security
An image analysis technology that enables real-time fully 3-dimensionally integrated reconstruction of the live video-data derived from CCTV system's multiple...
US-9,305,260 System and method for distinguishing human swipe input sequence behavior
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
US-9,305,189 Ruggedized, compact and integrated one-way controlled interface to enforce confidentiality of a secure enclave
A rugged, integrated network interface appliance for ensuring secure data transfer comprising send-only network interface circuitry comprising a microprocessor,...
US-9,305,187 Data security management systems and methods
Data security management system and methods are provided. First, a first system having a management authority is provided. The first system displays an input...
US-9,305,185 Method and apparatus for securing programming data of a programmable device
Circuitry and methods prevent unauthorized programming, or reprogramming, of a programmable device, by requiring a signature in the configuration data to match...
US-9,305,184 Packet-processing scheduler, security context, authentication, packet header, air cipher subsystem
An electronic circuit (200) includes one or more programmable control-plane engines (410, 460) operable to process packet header information and form at least...
US-9,305,183 Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
US-9,305,172 Multi-ring encryption approach to securing a payload using hardware modules
Disclosed are systems and methods of employing a multi-ring encryption approach to secure a data payload. Each ring of encryption may be encrypted from a key...
US-9,304,945 Synchronizing parallel applications in an asymmetric multi-processing system
A method for synchronizing parallel applications in a partitioned asymmetric multi-processing system having multiple independent levels of security is provided....
US-9,304,944 Secure memory access controller
A memory access circuit and a corresponding method are provided. The memory access circuit includes a crypto block in communication with a memory that encrypts...
US-9,304,761 System and method for collaborative programming of data entry workflows between system developers, end users,...
The present invention is a system for collaborative programming of data entry workflows between end users, Electronic Health Record (EHR) system developers, and...
US-9,304,576 Power management for a wearable apparatus
Apparatus, systems, and/or methods may provide power management. An attachment portion may secure an apparatus to a user. In one example, an apparatus includes...
US-9,304,557 Systems and methods for packaging high density SSDS
In various embodiments, a high-density solid-state storage unit includes a base section and a cassette section having plurality of flash cards. The cassette...
US-9,303,935 Secure smartphone-operated gun lock with means for overriding release of the lock
A gun locking and unlocking device, which may be configured to be disposed on or in a gun to alternatively prevent or enable firing, includes a data receiver, a...
US-9,302,675 Radio remote control system for controlling vehicle functions of a motor vehicle
A radio remote control for controlling at least one first vehicle function that is relevant for functional safety, and further vehicle functions not related to...
US-9,301,147 Method, apparatus, and system for data protection on interface in communications system
A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are...
US-9,301,146 Multiple network, shared access security architecture supporting simultaneous use of single SIM multi-radio...
A method and system is presented for a mobile wireless communication device that may communicate information to a first network device for enabling...
US-9,301,140 Behavioral authentication system using a secure element, a behaviometric server and cryptographic servers to...
Embodiments of the disclosed technology are directed to methods and/or systems for using behavioral authentication for authenticating particular users of...
US-9,301,134 Security key generation for dual connectivity
Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a...
US-9,300,692 System and method for implementing data migration while preserving security policies of a source filer
A data migration system in which security policies of a source file system are preserved, in an environment in which clients actively issue communications for...
US-9,300,679 System and method for monitoring computing servers for possible unauthorized access
A system is provided that includes one or more computing servers and a processing circuit for monitoring data transactions of the computing servers. Each of the...
US-9,300,677 Data security system
A method, computer system, and computer program product for validating data contained in a request sent by a requestor to a server application. A computer...
US-9,300,665 Credential authentication methods and systems
Methods and systems are provided for performing and verifying transactions involving authentication with a secure credential, such as a smart card, in an...
US-9,300,638 Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion...
A translator is provided for translating predetermined portions of packet header information including an address of a data packet according to a cipher...
US-9,300,636 Secure data exchange technique
Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the...
US-9,300,546 Network communication method, network communication system, network communication apparatus and program using...
A method for network communication under SNMP includes: producing an access request when a first device accesses management information stored in a second...
US-9,300,473 Module for "machine-to-machine" communications using public key infrastructure
Methods and systems are provided for efficient and secure "Machine-to-Machine" (M2M) between modules and servers. The module and server can utilize public key...
US-9,300,469 Secure computing system, secure computing method, secure computing apparatus, and program therefor
A third secure computing apparatus generates data Wb associated with each bit b of a segment t that satisfies a relation m.sub.A=s*t for a first input value...
US-9,299,417 DRAM security erase
A memory includes a DRAM array having memory cells, wordlines and bitlines coupled to the memory cells, and sense amplifiers. The memory can be configured to...
US-9,299,289 Pixel and organic light emitting display device using the same
An organic light emitting display device is capable of securing sufficient compensation period such that a threshold voltage of a driving transistor may be...
US-9,299,245 Guiding a user to safety from the premises of an industrial plant
A method, safety route guiding device and a computer program product enables users in the premises of an industrial plant to reach safety in case of an...
US-9,299,073 Secure card
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
US-9,299,018 Image forming apparatus equipped with secure print function, method of controlling the same, and storage medium
An image forming apparatus capable of flexibly controlling whether or not to perform user authentication when a user performs operations related to functions of...
US-9,298,999 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,298,951 Deletion of content in digital storage systems
A data processing and storage apparatus has a hardware security module and a data storage medium storing encrypted data objects and a hierarchical data...
US-9,298,947 Method for protecting the integrity of a fixed-length data structure
One feature pertains to a mechanism to secure a data structure by using a computationally efficient algorithm. A plurality of keys and/or masks may be...
US-9,298,941 Secure data copying
A method, computer program product, and system for the anonymization of sensitive data from a plurality of selected business objects or tables stored in a...
US-9,298,940 Secure storage for shared documents
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption...
US-9,298,937 Secure data parser method and system
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention...
US-9,298,935 Distributed privacy framework system and method of implementation
An apparatus, program product and method for managing access to a secure, encrypted webserver. A user computer may communicate through a cloud server with the...
US-9,298,932 Matrix code for encryption, storage, and transmission of data
A computer utilizes a matrix code to securely communicate information. To utilize the matrix code, the computer receives a scan of the matrix code, and...
US-9,298,926 Remediation of security vulnerabilities in computer software
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each...
US-9,298,924 Fixing security vulnerability in a source code
A computer implemented method for automatically fixing a security vulnerability in a source code is disclosed. The method includes obtaining identification of...
US-9,298,917 Enhanced security SCADA systems and methods
A system and method for a secure supervisory control and data acquisition (SCADA) system. Secure SCADA elements (SSEs) have individual system security...
US-9,298,916 Method and apparatus for enhanced file system monitoring on mobile communications devices
A system and method for using file system events to trigger a security scan. A file system watches all writable directory paths for defined file system events...
US-9,298,912 System and method for distinguishing human swipe input sequence behavior and using a confidence value on a...
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
US-9,298,904 Method for accessing a plurality of services by a mobile terminal user, and related secure device
The invention relates to a method for enabling the user of at least one mobile terminal to access a plurality of services, said method consisting of: creating...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.