Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,288,556 Method and apparatus for measuring body balance of wearable device
A wearable device includes a communication unit that wirelessly communicates with a first external device; a motion sensor that senses the user's motion; and a...
US-9,288,272 System and method for secure real-time cloud services
A system and method for providing secure, end-to-end data service enabling real-time data over the Internet is disclosed. The system and method provides a...
US-9,288,239 Method for recoverable message exchange independent of network protocols
A method is described to allow a device to retrieve a message, that is separated into a plurality of fragments, from a data source, wherein the method involves:...
US-9,288,229 Device association via video handshake
A method of pairing a first device with a second device is disclosed. Accordingly, an image that include encoded data is generated by the first device. The...
US-9,288,214 Authentication and authorization methods for cloud computing platform security
An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information...
US-9,288,207 Secure communications smartphone system
Methods, systems, and non-transitory data storage media are provided for secured communications where biometrics are used to secure communications sent over a...
US-9,288,199 Network access control with compliance policy check
Embodiments of the present invention involve a method and system including a network access control server, an authentication application running on a...
US-9,288,192 System and method for securing data from a remote input device
An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless...
US-9,288,176 Positionparameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
US-9,288,155 Computer system and virtual computer management method
A computer system, comprising: a virtual computer system and a verification system, the virtual computer system including: a deployment request reception part...
US-9,288,073 Communication system and transmission unit employed in same
Transmission and reception of data can be performed between first terminal communicating by transmission signal and second terminal communicating by...
US-9,288,061 Safe communication method with card
Disclosed is a safe communication method with a card, comprising: conducting mutual authentication between a card and an entity other than the card; and after...
US-9,288,038 Access-controlled data storage medium
The invention relates to a data carrier having a semiconductor chip. In order to prevent an attacker from determining secret data of the chip from intercepted...
US-9,286,791 Protection and security system including three-dimensional virtual reality
A system of electronic devices for the detection and location of changes in a predetermined space for the protection and security of places, persons, and goods,...
US-9,286,778 Method and system for security system tampering detection
A method and system for detecting tampering of a security system component is provided. An analytic alarm indicative of potential tampering with a security...
US-9,286,772 Security system and method
A security control apparatus, system and method are provided. The security control apparatus includes a wireless communication element that supports a plurality...
US-9,286,740 Method for displaying information
The invention relates to a method for displaying information, using a mobile identification provider (10) and an independent display unit (20), wherein said...
US-9,286,490 Systems and methods for providing conditional access to transmitted information
This disclosure relates to systems, methods, computer program products, and means that control access to position information at a receiver, or at another...
US-9,286,477 Secure app ecosystem with key and data exchange according to enterprise information control policy
Multiple apps of an ecosystem on a computer securely exchange encrypted data according to an information control policy of an enterprise, without allowing...
US-9,286,475 Systems and methods for enforcement of security profiles in multi-tenant database
Embodiments relate to systems and methods for the enforcement of security profiles in a multi-tenant database. A multi-tenant database can be populated with...
US-9,286,472 Efficient packet handling, redirection, and inspection using offload processors
A packet handling system is disclosed that can include at least one main processor, a plurality of offload processors connected to a memory bus and configured...
US-9,286,471 Rules based detection and correction of problems on mobile devices of enterprise users
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,286,457 Method and system for providing password-free, hardware-rooted, ASIC-based authentication of a human to a...
Biometric data are obtained from a biometric sensor on a mobile device, containing an ASIC, which is connected to or incorporated within it. The mobile device...
US-9,286,455 Real identity authentication
A real identity biometric authentication device includes a USB thumb drive form factor, with a biometric sensor and designated device processor and stored...
US-9,286,242 Information processing apparatus and program execution method
According to one embodiment, an information processing apparatus includes a processor, a main memory, and a memory controller. The memory controller executes an...
US-9,286,041 Software analysis framework
Presently described is a decompilation method of operation and system for parsing executable code, identifying and recursively modeling data flows, identifying...
US-9,282,898 End-to-end trusted communications infrastructure
A method of delivery of medical data via a trusted end-to-end communication link. The method comprises obtaining a measurement of a parameter of a human being...
US-9,282,105 Wide area network access management computer
A system and method for connecting a classified internet protocol (IP) network to a public IP network including an unclassified computing device. The...
US-9,282,102 Secure front-end interface
A secure front-end interface for a PLC, RTU or similar device is disclosed. A first server is coupled to the PLC via a communications link and is configured to...
US-9,282,093 Synchronizing credential hashes between directory services
The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a...
US-9,282,040 Smarter policy decisions based on metadata in data flows
Modern day user applications leverages new communication technologies such as WebRTC, WebEx, and Jabber allow devices to connect and exchange media content...
US-9,281,872 Near-field communication authentication
Various aspects are directed to circuit apparatuses, portable electronic devices, and executable applets pertaining to storing and providing secure access to...
US-9,281,219 Molecular receptor-based chemical field-effect transistor (CHEMFET) devices, systems, and methods for in-situ...
Embodiments include a method for securing a membrane material to a gate of a molecular receptor-based chemical field-effect transistor (CHEMFET). The method can...
US-9,280,907 Proctored performance analysis
Systems and methods described herein provide for administering and proctoring of a secure online exam that allows for complex testing utilizing practical...
US-9,280,770 Secure point of sale presentation of a barcode at an information handling system display
Unauthorized copying of a transaction barcode is prevented by including a sensed condition or other publicly-accessible data with the transaction barcode for...
US-9,280,732 Printing device, printing control method and recording medium capable of interruption printing with high security
A LAN control unit receives print data from a client device or the like. An input job storage unit registered on a hard disk a series of PDL commands included...
US-9,280,678 Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
US-9,280,677 Secure native application messaging with a browser application
A system for securely mediating messages between a native application and a browser application on a computing device includes running the browser application...
US-9,280,676 Development of business applications
In accordance with aspects of the disclosure, a system and methods are provided for managing development of business applications. The system and methods may be...
US-9,280,675 Encrypting and storing confidential data
Data storage circuitry for securely storing confidential data and a data processing apparatus for processing and storing the data and a method are disclosed....
US-9,280,672 Method for secure production printing
A method for printing a composite document creates a fixed data unit for a composite document, the fixed data unit being a portion of an individual document...
US-9,280,667 Persistent host determination
A system comprises a security manager to scan a network for host instances representing hosts on the network at that time, and record characteristics of the...
US-9,280,655 Application authentication method and electronic device supporting the same
A method for operating an electronic device is provided. The method includes executing, by a processor of the electronic device operable in a first mode (e.g. a...
US-9,280,490 Secure computing
Techniques and logic are presented for encrypting and decrypting programs and related data within a multi-processor system to prevent tampering. The decryption...
US-9,279,687 Data security system for a navigation system
A data security system for a navigation system comprising an enabling/disabling unit for enabling or disabling a data transfer from a data memory to a data...
US-9,277,423 Method and apparatus for transmitting/receiving a reference signal in a wireless communication system
A method and apparatus for transmitting/receiving reference signals in Long Term Evolution (LTE) and LTE-Advanced (LTE-A) systems includes determining whether a...
US-9,277,170 Apparatus for transceiving point to point moving signal reception high channel using horizontal blanking...
Provided are a method and apparatus for transceiving an asymmetric point-to-point moving signal and securing an uplink channel using a horizontal blanking...
US-9,277,068 Metadata support in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-9,277,017 Techniques for device independent session migration
Techniques for device independent session migration are presented. A secure mechanism is presented for a target device to receive a current authenticated...
US-9,277,009 Method and system for managing data in a communication network
A method for managing a plurality of files in a communication network having a plurality of clients includes a server receiving (502) metadata associated with a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.