Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,575,790 Secure communication using a trusted virtual machine
A client system, such as a computer or a smartphone, securely exchanges sensitive information with a remote service provider computer system such as a bank or...
US-9,575,728 Random number generation security
A technique for improving random number generation (RNG) security for a data processing system includes a storage subsystem of a processing unit receiving a...
US-9,572,503 Personal safety and security mobile application responsive to changes in heart rate
A software app for a mobile device is disclosed for alerting a custodian of a person to be protected of an emergency situation involving the person to be...
US-9,572,274 Securing mechanism
A securing mechanism is configured to secure an electronic device. The electronic device includes a body, a power adapter and a first data cable connecting the...
US-9,572,016 Methods and apparatus for use in transferring an assignment of a secure chip between subscription managers
Techniques for use in transferring an assignment of a secure chip of a wireless device from a current subscription manager (SM) of a current mobile network...
US-9,572,014 Service provider activation with subscriber identity module policy
Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently...
US-9,571,516 Cloud service usage monitoring system
A cloud service usage assessment system analyzes network traffic from an enterprise data network and generates cloud service usage analytics for the enterprise....
US-9,571,515 Notification of security question compromise level based on social network interactions
An approach is provided to improve security of security questions. In the approach, the system prompts a user for a security question. The security question and...
US-9,571,514 Notification of security question compromise level based on social network interactions
An approach is provided to improve security of security questions. In the approach, the system prompts a user for a security question. The security question and...
US-9,571,510 Systems and methods for identifying security threat sources responsible for security events
The disclosed computer-implemented method for identifying security threat sources responsible for security events may include (1) identifying security-event...
US-9,571,506 Dynamic enterprise security control based on user risk factors
Aspects dynamically set enterprise-level security rules. Risk values representing likelihoods of loss of enterprise secure data are determined for different...
US-9,571,499 Apparatus and method of providing security to cloud data to prevent unauthorized access
A method and apparatus for providing security of an electronic apparatus are provided. The method includes identifying an environment of a client to be provided...
US-9,571,465 Security verification by message interception and modification
Data security is enhanced by injecting insecurity into communications between two computer systems to test one of the computer systems. The insecurity is...
US-9,571,455 Remote credential management for hybrid clouds with enterprise networks
A system and method of initializing a virtual machine within a secure hybrid cloud is disclosed. One method includes transmitting service mode credentials to a...
US-9,571,454 Dynamic re-ordering of scanning modules in security devices
A method and apparatus are provided for preserving bandwidth of a security gateway by dynamically placing a module with a highest ratio of block rate to...
US-9,571,453 Kernel-level security agent
A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using...
US-9,571,287 Secure proofs of storage for deduplication
Storage providers can securely store data and avoid data duplication with secure derivative data and offload the responsibility of generating the secure...
US-9,571,283 Enabling packet handling information in the clear for MACSEC protected frames
Techniques are provided to append packet handling information "in the clear" ahead of security related information in a packet to be routed over a network to...
US-9,571,270 Construction and uses of variable-input-length tweakable ciphers
Innovations in the construction and use of variable-input-length tweakable ciphers ("VILTCs"). In some cases, a VILTC uses an initialization vector that is...
US-9,570,193 Implementing hidden security key in eFuses
A method and circuit for implementing a hidden security key in Electronic Fuses (eFuses), and a design structure on which the subject circuit resides are...
US-9,569,966 Bicycle tracking system with communication hub
A bicycle tracking system for a bicycle rental system includes a number of bicycles each including a bicycle computer configured to record and transmit trip...
US-9,569,937 Tactile touch screen
A machine (10) is operative to carry out financial transfers responsive to data included on data bearing records including user cards. The machine includes a...
US-9,569,669 Centralized video surveillance data in head mounted device
An apparatus includes a security location module that tracks a location of a user. The user has a heads-up display with a display that allows viewing by the...
US-9,569,642 Always-available embedded theft reaction subsystem
A system comprising a platform protected by an always-on always-available security system is described. In one embodiment, the system includes a risk behavior...
US-9,569,641 Data processing system with temperature monitoring for security
A processing system includes a processor and a temperature security module coupled to provide a temperature tamper signal to the processor. The temperature...
US-9,569,638 Trusted computing
A trusted computing device (TCD) includes an isolated environment, host interface, secure interface, and program instructions. The environment includes an...
US-9,569,636 Docking station for portable devices providing authorized power transfer and facility access
A docking station for docking portable electronic devices is disclosed. The docking station is configured to mechanically accept and operatively interface with...
US-9,569,630 Method and system for providing an encryption proxy
An encryption proxy is instantiated in a first computing environment and includes encryption proxy authentication data for identifying itself to a secrets...
US-9,569,628 Specialized circuitry for cryptographic authentication and other purposes
To prevent piracy, audiovisual content is encrypted prior to transmission to consumers. A low-cost, high-security cryptographic rights module (such as a...
US-9,569,623 Secure boot with resistance to differential power analysis and other external monitoring attacks
A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a...
US-9,569,615 Cyber security
Systems and methods that use probabilistic grammatical inference and statistical data analysis techniques to characterize the behavior of systems in terms of a...
US-9,569,604 User access control to a secured application
Embodiments described herein provide approaches for user access control to a secured application. Specifically, a custom authentication tool is configured to...
US-9,569,596 Secure workflow and data management facility
Disclosed is a computer program that provides a secure workflow environment through a cloud computing facility, wherein the secure workflow environment may be...
US-9,569,588 Attached personal information device
An information storage device may be semi-permanently attached to a wearer. The device can include an outer casing configured to be compatible with long term...
US-9,569,240 Method and system to provision and manage a computing application hosted by a virtual instance of a machine
A system and method are described for provisioning and managing virtual instances of a computing application running within a public virtualization space...
US-9,569,237 Virtual machine management using a downloadable subscriber identity module
A method is presented of establishing communications with a Virtual Machine, VM, in a virtualized computing environment using a 3GPPcommunications network. The...
US-9,569,202 Transparent type-based object augmentation by orthogonal functionality
Tools and techniques are described for transparently and safely augmenting the functionality of objects in an existing collection of objects. One approach...
US-9,568,599 Radar signal processing device, radar apparatus, and method of processing radar signal
A radar signal processing device is provided, which performs a scan correlation in a polar coordinate system to secure accuracy of the scan correlation, and...
US-9,566,989 Railway safety critical systems with task redundancy and asymmetric communications capability
A railway safety critical application system substitutes commercial off-the-shelf (COTS) hardware and/or software for railway-domain specific product...
US-9,566,813 Data carrier with see-through window and method for producing it
The invention relates to a data carrier having a see-through portion (24) that allows revealing security features (36) with a different appearance on each of...
US-RE46,310 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
An adaptive interface for a programmable system, for predicting a desired user function, based on user history, as well as machine internal status and context....
US-9,565,559 Method and system for preserving privacy during data aggregation in a wireless sensor network
A computer-based system and method for secured privacy preservation scheme while data aggregation in a non-hierarchical wireless sensor network that lacks...
US-9,565,212 Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
US-9,565,194 Utilizing a social graph for network access and admission control
Technologies for providing access control for a network are disclosed. The method may include receiving a request from a user to access a network, receiving a...
US-9,565,185 Facilitation of seamless security data transfer for wireless network devices
Configuration and credential data associated with a wireless network can be stored by the wireless network or a by a gateway device associated with the wireless...
US-9,565,181 Method and apparatus for automated password entry
A method and apparatus are provided for protecting security credentials (e.g., username/password combinations) and/or other sensitive data in a "password...
US-9,565,126 Virtual machine and application migration over local and wide area networks without timeout using data compression
Long distance cloud migration (LDCM) to overcome the limitations faced by the cloud migration techniques over long distance, high speed WAN infrastructures....
US-9,564,043 Automated firearm security measures to contact assistance
Removing a gun or other weapon from a holster may inevitably require police backup to secure officer safety. One example device may include a weapon securing...
US-9,563,999 Method and system for identifying a security document
A method is provided of identifying a security document using an identifying device. The identifying device is provided with a capacitance sensor and a second...
US-9,563,889 Method and apparatus for secure wireless point of sale transactions
In an embodiment, a method of masking transaction data for a secure wireless transaction includes transmitting wireless pseudo transaction data that includes...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.