Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,633,254 Intelligent motion capture element
Intelligent motion capture element that includes sensor personalities that optimize the sensor for specific movements and/or pieces of equipment and/or clothing...
US-9,633,234 System and method for a secure display module
A system for a secure display module includes a display element array, a driver controller, a communication interface, a host controller and a cryptographic...
US-9,631,899 Ballistic and impact protective military helmet assembly
A helmet assembly is provided including a front mount configured to attach to the front of the helmet above a brim of the helmet, a mandible for protecting a...
US-9,630,715 Interaction during delivery from aerial vehicle
An unmanned aerial vehicle (UAV) is disclosed that includes a retractable payload delivery system. The payload delivery system can lower a payload to the ground...
US-9,628,274 Hardening tokenization security and key rotation
A method of using a hardware security module and an adjunct application programming interface to harden tokenization security and encryption key rotation is...
US-9,626,829 Data processing device and method for interaction detection
The current invention discloses devices and methods that may be used for detection and verification of interactions, such as collisions, between objects in...
US-9,626,205 Hypervisor driven embedded endpoint security monitoring
Aspects of the present disclosure are directed to methods and systems of hypervisor driven embedded endpoint security monitoring. A computer implemented method...
US-9,621,521 Rapid data encryption and decryption for secure communication over open channels with plausible deniability
Technologies are generally described for providing rapid data encryption and decryption for secure communication over an open channel with plausible...
US-9,619,985 Home automation communication system
A method for security and/or automation systems is described. In one embodiment, the method may include receiving occupancy data associated with a home. The...
US-9,619,984 Systems and methods for correlating data from IP sensor networks for security, safety, and business...
Monitoring systems and methods for use in security, safety, and business process applications utilizing a correlation engine are disclosed. Sensory data from...
US-9,618,287 Secure smartphone-operated locking device
A gun trigger-locking device which is configured to be manually installed on a gun with a trigger-blocking member disposed behind the trigger to prevent the gun...
US-9,616,828 Global automotive safety system
A system for providing security to an in-vehicle communication network, the system comprising: a data monitoring and processing hub; and at least one module...
US-9,616,814 Vehicle security alarming system determining relative velocity between a front car and a rear car by sounds...
A vehicle security alarming device determining a relative velocity between a front car and a rear car by sounds retrieved therefrom, comprising a vehicle noise...
US-9,615,196 NFC device configuration after device power up
A NFC tag includes an NFC controller, with a secure element coupled to the NFC controller. The secure element is to send first configuration data to the NFC...
US-9,615,063 Method and apparatus for visual monitoring
A device for visual monitoring comprises a mobile chipset disposed in a housing, at least one eyestalk attached to the housing and communicatively coupled to...
US-9,615,060 Secure nonscheduled video visitation system
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated...
US-9,615,036 Single element radiometric lens
The disclosure describes systems and apparatuses that include a focusable lens, as well as methods for focusing the optical lens. The focusable lens system...
US-9,614,917 System and method of providing secure data transfer
A system and method is provided for providing secure accelerated data transfer. The system may transparently provide accelerated data transfer between a client...
US-9,614,871 Cloud-based surveillance with intelligent tamper protection
In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively...
US-9,614,870 Method of DDoS and hacking protection for internet-based servers using a private network of internet servers by...
A method of DDoS and hacking protection for internet-based servers using a private network of internet servers utilizes multiple data streams sent over a...
US-9,614,858 Method and system for remote data access using a mobile device
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
US-9,614,813 Methods and systems to implement fingerprint lookups across remote agents
The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect...
US-9,614,774 Method for providing a QoS prioritized data traffic
A method for transmitting data packets of a data traffic between a sending device (10, 80) and a receiving device (80, 10) via a VPN client (200) and a VPN...
US-9,614,681 Private electronic signature service for electronic documents
Techniques are disclosed for providing an electronic signature service where the content of an electronic document to be signed remains unknown to the service....
US-9,614,676 Cryptographically-secure packed proactive secret sharing (PPSS) protocol
Described is a system for implementing proactive secret sharing. The system uses a Secret-Share protocol to distribute, by a computing device, a block of secret...
US-9,614,671 User access control based on a graphical signature
A user inputs a pattern consisting of a plurality of lines. The lines are classified by relative length, overall direction and degree of curvature. Where a line...
US-9,614,670 Systems and methods for encryption and provision of information security using platform services
Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in...
US-9,614,669 Secure network communications using hardware security barriers
One embodiment includes hardware-based cybersecurity devices that create a physical barrier ("hardware security barrier") between a computer's (or other...
US-9,613,355 Multi-layer transaction tracking and encryption
Embodiments for tracking multi-layer secured transactions include systems for providing a dedicated secure transaction channel to a user and sending...
US-9,613,352 Card-less payments and financial transactions
Payments and financial transactions are made without a physical card (and without a password). Payment information of a payer is functionally handicapped while...
US-9,613,304 Smartcard connector
A smartcard connector for connecting a smartcard within a card holder to an electronic device. The smartcard connector includes a card holder having a card...
US-9,613,228 Isolation and presentation of untrusted data
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application....
US-9,613,225 Electronic device, system and method for securing data
An electronic device capable of securing data is provided. The electronic device includes a storage device for storing data and a number of securing strategies....
US-9,613,220 Secure data parser method and system
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention...
US-9,613,213 Using telemetry to reduce malware definition package size
Clients send telemetry data to a cloud server, where the telemetry data includes security-related information such as file creations, timestamps and malware...
US-9,613,190 Systems and methods of secure data exchange
An example method for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment...
US-9,613,163 Efficient packet forwarding using cyber-security aware policies
For balancing load, a forwarder can selectively direct data from the forwarder to a processor according to a loading parameter. The selective direction includes...
US-9,612,904 Memory system and method for securing volatile memory during sleep mode using the same ECC module used to...
In one embodiment, a memory system is provided comprising a volatile memory, a non-volatile memory, and an error correction code (ECC) module. The ECC module is...
US-9,612,782 Scheduled and secured cloud print services
Techniques are provided for processing scheduled and secured print requests. In one embodiment, a printing device receives a notification form a network service...
US-9,612,617 Wearable computing device for managing and storing data
The disclosed embodiments present a wearable computing device for storing and managing data. The wearable computing device includes a wristband including a...
US-9,611,403 Fluorescent security enabled ink for digital offset printing applications
An ink composition useful for digital offset printing applications comprises a fluorescent colorant and a plurality of curable compounds. The compounds have...
US-9,610,619 Supercritical fluid cleaning of banknotes and secure documents
A method and system for cleaning a secure instrument, such as a banknote, including a substrate, visual data and a security feature, including exposing the...
US-9,610,086 Method of manufacturing an arthroplasty jig
A method and system for performing a total joint arthroplasty procedure on a patient's damaged bone region. A CT image or other suitable image is formed of the...
US-9,609,399 Automatic reporting of prognosis data from wireless mesh sensors to cloud
A apparatus is provided that includes a plurality of wireless sensors arranged into a mesh network, wherein each of the plurality of sensors detects threats...
US-9,609,129 System and method for secure transmission of data signals
The present invention provides systems and methods for controlling signaling data transmitted over a communication system between a first party and a second...
US-9,609,026 Segmented networks that implement scanning
Systems for providing scanning within distributed services are provided herein. In some embodiments, a system includes a plurality of segmented environments...
US-9,609,023 System and method for software defined deployment of security appliances using policy templates
A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual...
US-9,609,018 System and methods for reducing impact of malicious activity on operations of a wide area network
System architecture and methods for controlling improper network activity in a wide area network, where the system includes multiple service provider devices...
US-9,609,011 Interface having selectable, interactive views for evaluating potential network compromise
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,609,009 Network security threat detection by user/user-entity behavioral analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.