Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,805,195 System and method for transferring files between computer systems using information invariant data transformation
Systems and methods using Information-invariant Data Transformation (IIDT) in the transfer of files from an un-trusted to a trusted computer system are...
US-9,801,059 Security for wireless broadcasts
Methods and systems are provided for concealing identifying data that may be used to identify a beacon or device in broadcasts unless an observer device is able...
US-9,801,056 Wireless communication system to secure data communications between application programming interfaces
A wireless communication system to secure data communications between APIs. The wireless communication system includes a first API for a first sensor in a first...
US-9,801,052 Method and system for securing control packets and data packets in a mobile broadband network environment
The present invention provides a method and an apparatus for securing data packets and control messages in a mobile broadband network environment. In one...
US-9,801,004 Device, method, and system for securely pairing mobile communication devices using movement
A device, method, and system for securely pairing mobile communication devices using device movement includes capturing a begin movement, capturing arbitrary...
US-9,800,879 Methods and systems for reversible multi-layer data hiding
Methods and systems for providing multi-layer reversible data hiding are disclosed. According to the methods and systems, multi-layer reversible data hiding...
US-9,800,672 Computer work distribution system and method
A system and method are presented that improve work cooperation among computers. Communication between programs is combined with restart data to travel via a...
US-9,800,616 Integrating policies from a plurality of disparate management agents
Described herein are embodiments for managing policies of a mobile device. In embodiments, a mobile device receives policy containers from a plurality of...
US-9,800,608 Processing data flows with a data flow processor
An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch...
US-9,800,606 Systems and methods for evaluating network security
A computer-implemented method for evaluating network security may include (1) receiving, by a security server, a request to report a network risk score for an...
US-9,800,596 Automated detection of time-based access anomalies in a computer network through processing of login data
A processing device comprises a processor coupled to a memory and is configured to obtain data characterizing login events for multiple user identifiers. The...
US-9,800,582 Method and apparatus generating and applying security labels to sensitive data
The disclosure comprises a method, an apparatus, and instructions for controlling a computer to implement a security labeling service (SLS) to tag an electronic...
US-9,800,568 Methods for client certificate delegation and devices thereof
Methods, non-transitory computer readable media, and network traffic management apparatuses that receive a request from a client device to access an...
US-9,800,563 Method and device for processing data security channel
Embodiments of the present invention provide a method and a device for processing a data security channel of a tunnel, where the method includes: receiving an...
US-9,800,556 Systems and methods for providing data security services
Embodiments described herein provide enhanced computer- and network-based systems and methods for providing data security with respect to computing services,...
US-9,800,549 Hierarchical clustering in a geographically dispersed network environment
An example method for facilitating hierarchical clustering in a geographically dispersed network environment is provided and includes receiving a packet at one...
US-9,800,412 System and method for securing sensitive data
An approach is provided for securing data in a technical environment. In one embodiment, a processor obtains a first file, which when executed installs a first...
US-9,800,406 Technologies for modifying a first cryptographic cipher with operations of a second cryptographic cipher
Generally, the present disclosure provides technology modifying a first cryptographic cipher with one or more operations of a second cryptographic cipher. In...
US-9,800,405 Blackbox security provider programming system permitting multiple customer use and in field conditional access...
A method, apparatus, article of manufacture, and a memory structure for securely providing data for use by a hardware device of a receiver. The method utilizes...
US-9,799,154 Electronic key, electronic closure system and a method for allowing an access authorization
The invention relates to an electronic key (32) having at least two contacts (324, 325, 326) for the transmission of data and/or energy to an electronic lock...
US-9,799,032 Client-side security for tokenized transactions
A program product and device for processing transactions within a token transfer device, such as a smartphone or other portable electronic device. The method...
US-9,799,029 Securely receiving data input at a computing device without storing the data locally
The present invention is generally directed to securely receiving data input at a computing device without storing the data locally. The invention allows an...
US-9,798,965 On card display of data from secured chip
A retrofitted credit card including a certified smart card chip, a display and retrofitted emulation circuitry operative to enable the certified smart card chip...
US-9,798,942 Biometric recognition method with speed and security feature suitable for POS/ATM applications
A method quickly recognizes a person by identification codes derivable from biometric data includes registering and recognizing at least one user from multiple...
US-9,798,901 Device having a security module
A device securely accesses data in a memory via an addressing unit which provides a memory interface for interfacing to a memory, a core interface for...
US-9,798,895 Platform identity architecture with a temporary pseudonymous identity
In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide...
US-9,798,893 Secure format-preserving encryption of data fields
In one embodiment, a computer-implemented method includes extracting first key derivation data from a first row of data to be stored in a database, where the...
US-9,798,886 Bio-medical sensing platform
Methods, devices, systems, and computer program products for implementing a bio-medical sensing platform are provided herein. A method includes receiving one or...
US-9,798,882 Real-time model of states of monitored devices
A model representing system components and events of a plurality of monitored devices as data objects is described herein. The model resides on a security...
US-9,798,881 Dynamic feature enhancement in client server applications and high volume server deployment with dynamic app...
Generally, this disclosure provides methods and systems for dynamic feature enhancement in client server applications and for high volume server deployment with...
US-9,797,744 Electronic flight data display instrument
An electronic display instrument configured to secure in a desired position over multiple pre-existing instrument holes in a dashboard of an aircraft in place...
US-9,794,789 Proximity-based system that secures linked wireless-enabled devices
The proliferation of networked, wireless-enabled devices is challenged by the reliance upon password management and user knowledge of privacy and security...
US-9,794,787 System and method for limiting mobile device functionality
The present invention relates to systems and methods that employ various mechanisms to selectively disable mobile device functionality. In general, mobile...
US-9,794,775 Methods and devices for performing a mobile network switch
A method of performing a switch from a first mobile network to a second mobile network by a mobile terminal comprising a secure element includes the steps of:...
US-9,794,646 Method and device to embed watermark in uncompressed video data
A system and method to watermark an uncompressed content received at a client device in a compressed form and encrypted by at least one content key, said...
US-9,794,378 Network traffic controller (NTC)
A Network Device (ND) may be configured to enable secure digital video streaming for HD (high definition) digital video systems over a standard network. The ND...
US-9,794,368 Apparatus and method for managing subscriber profile in wireless communication system
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates...
US-9,794,299 Passive based security escalation to shut off of application based on rules event triggering
Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications...
US-9,794,297 Security compliance framework usage
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
US-9,794,293 System and method for monitoring computing servers for possible unauthorized access
A system is provided that includes one or more computing servers and a processing circuit for monitoring data transactions of the computing servers. Each of the...
US-9,794,290 Quantitative security improvement system based on crowdsourcing
The efficacy of security products and practices is quantified, based on monitored activities and conditions on multiple computers over time. A set of metrics is...
US-9,794,274 Information processing apparatus, information processing method, and computer readable medium
An attack detection apparatus (6) collects packets a transmission source or a transmission destination of which is a protection target apparatus (5), and...
US-9,794,270 Data security and integrity by remote attestation
The invention includes a system comprising a device, software installed on the device and coupled to the device's hardware and software stack to execute data...
US-9,794,256 System and method for advanced control tools for administrators in a cloud-based service
A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that provides advanced control tools for administrators of...
US-9,794,247 Method to prevent cloning of electronic components using public key infrastructure secure hardware device
An electronic component includes a processor and a memory. The electronic component has a secure platform capable of storing at least one dual key pair and a...
US-9,794,246 Increased communication security
An apparatus may include a communication interface and a security component. The communication interface may be configured to receive a Constrained Application...
US-9,794,228 Security challenge assisted password proxy
Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An...
US-9,794,224 System and method for creating a trusted cloud security architecture
The present invention provides a method for providing a computer implemented method and system for creating a trusted cloud security architecture having the...
US-9,794,096 Direct synchronization of synthesized clock
The Direct Synchronization of Synthesized Clock (DSSC) contributes a method, system and apparatus for reliable and inexpensive synthesis of inherently stable...
US-9,794,071 Digital data content certification system, data certification device, user terminal, computer program and...
A file is created in which digital data and a certificate are integrated and content authentication for the digital data and the certificate are performed...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.