Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,276,959 Client-configurable security options for data streams
A configuration request comprising a security option selected for a particular data stream is received. Nodes of a plurality of functional categories, such as a...
US-9,276,946 Blacklisting and whitelisting of security-related events
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable...
US-9,276,922 Border property validation for named data networks
One embodiment provides a system for distributing packets within a trust domain. During operation, the system receives, by an ingress node in the trust domain,...
US-9,276,910 Systems and methods for convenient and secure mobile transactions
Systems and methods for conducting convenient and secure mobile transactions between a payment terminal and a mobile device, e.g., in a fueling environment, are...
US-9,276,909 Integrity protection and/or ciphering for UE registration with a wireless network
Techniques for performing registration with a wireless network using integrity protection and/or ciphering are described. A user equipment (UE) may perform a...
US-9,276,907 Load balancing in a network with session information
Methods and systems for balancing load among firewall security devices (FSDs) are provided. According to one embodiment, session data, including session entries...
US-9,276,772 Method and apparatus for transmitting and receiving data based on secured path bandwidth in network established...
A method and apparatus for transmitting and receiving data. The method and apparatus previously determines a validity of a data transmission path for...
US-9,276,740 Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application...
Methods and systems are provided for supporting efficient and secure "Machine-to-Machine" (M2M) communications using a module, a server, and an application. A...
US-9,276,738 Digital tachograph
A digital tachograph has a security module. A public key, a secure private key, and a signage are stored in the security module. Vehicle-relevant data and the...
US-9,275,528 Point of sale terminal having enhanced security
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
US-9,275,503 Method and apparatus for remotely communicating vehicle information to the cloud
The present invention relates generally to the communication of vehicle data, diagnostics and related information with a network remote from the vehicle, and...
US-9,275,348 Identifying participants for collaboration in a threat exchange community
Identifying participants for collaboration in a threat exchange community can include receiving security data from a plurality of participants at a threat...
US-9,275,257 Secure communication architecture
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption...
US-9,275,238 Method and apparatus for data security reading
A method for data security reading includes steps of: receiving a hardware instruction; analyzing said hardware instruction; if said hardware instruction is a...
US-9,275,237 Method and apparatus for privacy and trust enhancing sharing of data for collaborative analytics
One embodiment of the present invention provides a system for privacy-preserving sharing of data for secure collaboration. During operation, the system obtains...
US-9,275,234 Protecting data on a mobile device
A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a "data...
US-9,275,225 Linear address mapping protection
Technologies for securing an electronic device include determining addresses of one or more memory pages, injecting for each memory page a portion of identifier...
US-9,275,221 Context-aware permission control of hybrid mobile applications
Controlling access to secure resources of a data processing system is provided. An input-to-output mapping of an application installed on the data processing...
US-9,275,213 Method and system for securing the entry of data to a device
A method and structure for entering authentication data into a device by displaying in an optical unit a key map which correlates data input into the device...
US-9,275,210 System and method of enhancing security of a wireless device through usage pattern detection
A method of identifying a user of a device having a security policy and including a touch sensitive input device. The method includes receiving data...
US-9,275,094 Security in enterprise level business information networking
Systems, apparatus, and methods for implementing enterprise level social and business information networking are provided. Users can receive relevant...
US-9,275,071 Systems and methods for secure remote storage
Systems and methods are provided for transmitting data to at least one storage system. A request is received to store a data set in a storage location. In...
US-9,275,004 Hybrid firewall for data center security
A system and method for managing a hybrid firewall solution, employing both hardware and software firewall components, for a cloud computing data center is...
US-9,274,976 Code tampering protection for insecure environments
In the field of computer software (code) security, it is known to include verification data such as hash values in or associated with the code to allow...
US-9,274,729 Print function system and method for secure cloud data storage
A system and method of transferring data between human readable documents using a virtual print driver is disclosed. A first user's computer has a standard text...
US-9,271,149 Managing hidden security features in user equipment
A device determines whether a PTT application is authenticated to access a first API and a second API, and prevents the PTT application from accessing the first...
US-9,271,129 Mobile messaging hub enabling enterprise office telephone numbers
A messaging hub provides communication services for user devices associated with an enterprise office telephone number. The messaging hub establishes a secure...
US-9,270,777 Social media and data sharing controls for data security purposes
Social media and data sharing controls may be provided. Upon receiving a request to transmit an element of data to a recipient, a determination may be made as...
US-9,270,765 Security for network delivered services
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
US-9,270,735 Systems and methods for improved multisite management and reporting of converged communication systems and...
The present invention discloses improved systems and methods for multisite management of computer server systems and in particular converged communication...
US-9,270,700 Security protocols for mobile operator networks
Security protocols for mobile operator networks are described. In embodiments, mobile communication link is established between a mobile phone and a media...
US-9,270,688 Tool for the centralized supervision and/or hypervision of a set of systems having different security levels
A tool for the supervision and/or hypervision of a set of systems of different security levels, the systems transmitting messages, includes a display system,...
US-9,270,676 Method and system for securing user identities and creating virtual users to enhance privacy on a communication...
A method of enabling a real entity to access a service on a communication network using a virtual entity, the method including the steps of establishing a user...
US-9,270,664 System and method for secure reciprocal exchange of data
A system for transmission of data between a first device operated by a first user and a second device operated by a second user includes a database that is in...
US-9,270,649 Secure software authenticator data transfer between processing devices
A method comprises establishing a network connection between the first processing device and the second processing device for transfer of data associated with a...
US-9,270,647 Client/server security by an intermediary rendering modified in-memory objects
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more...
US-9,270,639 Load balancing among a cluster of firewall security devices
A method for balancing load among firewall security devices in a network is disclosed. Firewall security devices are arranged in multiple clusters. A switching...
US-9,270,580 Method and system for traffic isolation in a network
One embodiment of the present invention provides a system that facilitates traffic isolation (TI) in a network. During operation, the system configures a set of...
US-9,270,492 System and method for providing network support services and premises gateway support infrastructure
A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely...
US-9,270,466 System and method for temporary secure boot of an electronic device
The invention discloses system and method of temporary secure boot process of an electronic device. The method comprises: generating a first token according to...
US-9,270,458 Encryption processing device, encryption processing method, and program
An encryption processing device including an encryption processing part configured to divide configuration bits of data to be data processed into plural lines,...
US-9,270,457 Optimizing security bits in a media access control (MAC) header
A method of retrieving security information in a media access control (MAC) header by a wireless station may include receiving a data unit, such as a protocol...
US-9,270,449 Secured communication in network environments
A computing device can obtain a session key for encrypting data that is communicated between a client device and the computing device. The computing device can...
US-9,270,278 Spin transfer torque based memory elements for programmable device arrays
Disclosed herein are semiconductor device arrays, such as, Field Programmable Gate Arrays (FPGAs) and Complex Programmable Logic Arrays (CPLAs) that use...
US-9,270,274 FPGA configuration data scrambling using input multiplexers
Circuits, methods, and apparatus that provide for protection of configuration bitstreams from theft. One exemplary embodiment receives a scrambled configuration...
US-9,269,990 Battery management for a breathing assistance system
A method for providing battery security in a breathing assistance system configured to provide breathing assistance to a patient is provided. A battery security...
US-9,269,418 Apparatus and method for controlling refreshing of data in a DRAM
An apparatus comprises a dynamic random-access memory (DRAM) for storing data. Refresh control circuitry is provided to control the DRAM to periodically perform...
US-9,269,258 Method and control arrangement to secure an alarm system
A method and control arrangement to secure an alarm system in a site to be monitored. The readiness to forward an alarm out of the site is monitored with a...
US-9,269,250 Immediate response security system
Aspects of the present disclosure involve an intelligent and immediate response security system configured to provide continuous and immediate security data to...
US-9,268,986 Security feature
According to one example, there is provided a method of generating a security feature that encodes data. The method comprises obtaining an n-bit code of data to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.