Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,298,898 Event-based security challenges
Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a...
US-9,298,894 Cache structure for a computer system providing support for secure objects
A method (and structure) of enhancing efficiency in processing using a secure environment on a computer, includes, for each line of a cache, providing an...
US-9,298,878 System and method for real-time transactional data obfuscation
A system and method for providing transactional data privacy while maintaining data usability, including the use of different obfuscation functions for...
US-9,298,646 Procedure for the preparation and performing of a post issuance process on a secure element
The invention relates to a method for enabling post issuance operation on a secure element connectable to a communication device. The method allows an SE...
US-9,298,533 Portable data carrier having operating error counter
In a method in a portable data carrier for securing the data carrier against external attacks on the data carrier, there is employed at least one counter in the...
US-9,298,219 Security device for functional display, security, and charging of handheld electronic devices
A security device for allowing functional display and charging of handheld electronic devices is disclosed. The security device includes clamps with channels...
US-9,297,615 Multiple-zero-point riflescope turret system
A riflescope aiming system that includes a telescopic sight, a multiple-zero-point elevation turret and an aiming reference system. The multiple-zero-point...
US-9,295,036 CQI transmission power control method and apparatus for wireless communication system supporting multi-cell HSDPA
A CQI transmission power control method is provided for transmitting CQIs of multiple cells is provided for a multi-cell HSDPA system in which multiple cells...
US-9,295,032 Secure aircraft data transmission using multiple communication channels
Provided are methods and systems for terrestrial data transmission between aircraft and external networks, such as airline networks and/or airport networks....
US-9,294,919 Method for exporting on a secure server data comprised on a UICC comprised in a terminal
A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the...
US-9,294,917 Method, device, and system for network-based remote control over contactless secure storages
A typical system environment comprises a terminal device, a secure storage subsystem, and an interconnectivity component. The terminal device has a network...
US-9,294,914 Localized visible light communications among wireless communication devices
A method and apparatus for monitoring a localized region of a touch screen for a plurality of sensor inputs to identify a camera profile of at least one user...
US-9,294,913 Android-based secure handheld network access device and micro-USB version of IEEE 802.15.4 bridge for ACSD networks
This disclosure focuses on the development of a micro-usb module that allows a smart-device to transmit and receive IEEE 802.25.4 messages via a connection...
US-9,294,901 Synoptic emergency cellular device and system
A wearable emergency cellular device for use in a medical emergency alert situation includes an application containing synoptic medical information and other...
US-9,294,788 Method, cryptographic system and security module for descrambling content packets of a digital transport stream
A method and cryptographic system for descrambling content packets, included within a digital transport stream, having conditional access messages and header...
US-9,294,610 Emergency alert system and program for portable devices
A system and software application that communicates with a central service for alerting a security service that help is needed, wherein an application running...
US-9,294,575 Transmitting appliance-specific content to a user device
Methods and systems are presented for transmitting appliance-specific content to a user device associated with an appliance. In some embodiments, a third party...
US-9,294,511 Sending out-of-band notifications
Out-of-band notifications are used to inform users of clients of security policy enforcement actions, such as enforcement of a data loss prevention (DLP)...
US-9,294,507 Techniques for data security in a multi-tenant environment
The usage of data in a multi-tenant environment can be controlled by utilizing functionality at the hypervisor level of various resources in the environment....
US-9,294,500 System and method for creating and applying categorization-based policy to secure a mobile communications...
A server creates categorization-based application policies and selects a specific policy to send to a mobile communications device. In one embodiment, the...
US-9,294,498 Online portal for improving cybersecurity risk scores
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity....
US-9,294,494 Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
US-9,294,472 Apparatus and method for managing health data
An apparatus and method for managing health data through a user terminal are provided. The method includes inputting a user terminal number for identifying the...
US-9,294,469 Systems and methods for establishing a connection between an appliance and a home energy management device
The present disclosure provides systems and methods for establishing a connection between an appliance and a home energy management device. Upon being prompted...
US-9,294,463 Apparatus, method and system for context-aware security control in cloud environment
An apparatus, method and system for context-aware security control in a cloud environment are provided. The apparatus includes an authentication header...
US-9,294,449 Low latency active noise cancellation system with client intercommunication
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content...
US-9,294,448 Cryptographic security functions based on anticipated changes in dynamic minutiae
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
US-9,294,445 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,294,444 Systems and methods for cryptographically splitting and storing data
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,294,443 Secure integration of hybrid clouds with enterprise networks
A system and method of managing secure integration of a cloud-based computing resource with a private domain are disclosed. One system includes a hybrid cloud...
US-9,294,440 Secure inter-zone data communication
A proxy receives a message from a computing system in a trusted secure zone directed to a computing system outside the trusted secure zone. The proxy determines...
US-9,294,438 Cloud computing method and system
Methods and systems integrating sensitive or private data with cloud computing resources while mitigating security, privacy and confidentiality risks associated...
US-9,294,402 Router, method for controlling router, and program
A router includes an input section configured to receive data, a buffer section including a plurality of data storage sections and configured to store the data...
US-9,294,288 Facilitating secure online transactions
A method and system for mutually authenticating an identity and a server is provided in accordance with an aspect of the present invention. The method commences...
US-9,294,283 Methods and devices for monitoring the integrity of an article during transporting said article
The method for obtaining information relating to the integrity of an article (2) as assessed from an exposure of said article (2) to physical or environmental...
US-9,294,277 Audio encryption systems and methods
Encryption systems and methods for audio data, and more particularly, for complete audio encryption of recorded data for transmission, management, review, and...
US-9,294,268 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
US-9,293,169 Seal-type label to contain pressurized gas environment
In some embodiments, a data storage device has a housing with a cover and a base to define an interior environment. Fasteners extend through the housing to...
US-9,292,987 System and method for fully encrypted remote web-based voting
The presented invention discloses an electronic web-based election system and method for fully encrypted secure remote voting, wherein the voting data is fully...
US-9,292,986 Secured storage container
A secured storage container for transporting storage devices from a data center to a destruction center for degaussing or other destruction techniques. The...
US-9,292,805 Human security and survival system
The invention relates to a method and system of filling and maintaining a database containing geo-localized user data comprising the following steps:...
US-9,292,705 Management of drone operations and security in a pervasive computing environment
A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use...
US-9,292,702 Dynamic switching of security configurations
Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first...
US-9,292,700 Method and system for securing data
A method for securing user data includes the steps of: a) setting the user data as input data; b) randomly fragmenting the input data into a plurality of Atoms...
US-9,292,697 Matrix code for encryption, storage, and transmission of data
A computing device utilizes matrix codes to securely communicate information with a variety of servers. The computing device receives public user data, and...
US-9,292,693 Remediation of security vulnerabilities in computer software
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each...
US-9,292,673 Virtual key management and isolation of data deployments in multi-tenant environments
Tenants in a multi-tenant shared deployment are provided their own distinct key spaces over which they control a key management system. In this manner, virtual...
US-9,292,619 Method and system for detecting movement of a signed element in a structured document
A sending entity creates a structured document and communicates it to a receiving entity includes a transform to ensure document elements are not moved during...
US-9,290,966 System for providing power and data transmission between a door and a frame
A system for providing wire-free and contact free electric power and communication connection in a security installation between a door and a frame. The cores,...
US-9,288,676 Trusted sensor data unaffected when an application processor operates in an unlocked state
Arrangements described herein relate to controlling RF communications by a communication device. Raw sensor data from one or more sensors can be received by a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.