Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,299,245 Guiding a user to safety from the premises of an industrial plant
A method, safety route guiding device and a computer program product enables users in the premises of an industrial plant to reach safety in case of an...
US-9,299,073 Secure card
Systems and methods for monetary cards are described. The cards are free from personally identifiable data, e.g., no name or embossment. In an example, the card...
US-9,299,018 Image forming apparatus equipped with secure print function, method of controlling the same, and storage medium
An image forming apparatus capable of flexibly controlling whether or not to perform user authentication when a user performs operations related to functions of...
US-9,298,999 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,298,951 Deletion of content in digital storage systems
A data processing and storage apparatus has a hardware security module and a data storage medium storing encrypted data objects and a hierarchical data...
US-9,298,947 Method for protecting the integrity of a fixed-length data structure
One feature pertains to a mechanism to secure a data structure by using a computationally efficient algorithm. A plurality of keys and/or masks may be...
US-9,298,941 Secure data copying
A method, computer program product, and system for the anonymization of sensitive data from a plurality of selected business objects or tables stored in a...
US-9,298,940 Secure storage for shared documents
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption...
US-9,298,937 Secure data parser method and system
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention...
US-9,298,935 Distributed privacy framework system and method of implementation
An apparatus, program product and method for managing access to a secure, encrypted webserver. A user computer may communicate through a cloud server with the...
US-9,298,932 Matrix code for encryption, storage, and transmission of data
A computer utilizes a matrix code to securely communicate information. To utilize the matrix code, the computer receives a scan of the matrix code, and...
US-9,298,926 Remediation of security vulnerabilities in computer software
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each...
US-9,298,924 Fixing security vulnerability in a source code
A computer implemented method for automatically fixing a security vulnerability in a source code is disclosed. The method includes obtaining identification of...
US-9,298,917 Enhanced security SCADA systems and methods
A system and method for a secure supervisory control and data acquisition (SCADA) system. Secure SCADA elements (SSEs) have individual system security...
US-9,298,916 Method and apparatus for enhanced file system monitoring on mobile communications devices
A system and method for using file system events to trigger a security scan. A file system watches all writable directory paths for defined file system events...
US-9,298,912 System and method for distinguishing human swipe input sequence behavior and using a confidence value on a...
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
US-9,298,904 Method for accessing a plurality of services by a mobile terminal user, and related secure device
The invention relates to a method for enabling the user of at least one mobile terminal to access a plurality of services, said method consisting of: creating...
US-9,298,898 Event-based security challenges
Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a...
US-9,298,894 Cache structure for a computer system providing support for secure objects
A method (and structure) of enhancing efficiency in processing using a secure environment on a computer, includes, for each line of a cache, providing an...
US-9,298,878 System and method for real-time transactional data obfuscation
A system and method for providing transactional data privacy while maintaining data usability, including the use of different obfuscation functions for...
US-9,298,646 Procedure for the preparation and performing of a post issuance process on a secure element
The invention relates to a method for enabling post issuance operation on a secure element connectable to a communication device. The method allows an SE...
US-9,298,533 Portable data carrier having operating error counter
In a method in a portable data carrier for securing the data carrier against external attacks on the data carrier, there is employed at least one counter in the...
US-9,298,219 Security device for functional display, security, and charging of handheld electronic devices
A security device for allowing functional display and charging of handheld electronic devices is disclosed. The security device includes clamps with channels...
US-9,297,615 Multiple-zero-point riflescope turret system
A riflescope aiming system that includes a telescopic sight, a multiple-zero-point elevation turret and an aiming reference system. The multiple-zero-point...
US-9,295,036 CQI transmission power control method and apparatus for wireless communication system supporting multi-cell HSDPA
A CQI transmission power control method is provided for transmitting CQIs of multiple cells is provided for a multi-cell HSDPA system in which multiple cells...
US-9,295,032 Secure aircraft data transmission using multiple communication channels
Provided are methods and systems for terrestrial data transmission between aircraft and external networks, such as airline networks and/or airport networks....
US-9,294,919 Method for exporting on a secure server data comprised on a UICC comprised in a terminal
A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the...
US-9,294,917 Method, device, and system for network-based remote control over contactless secure storages
A typical system environment comprises a terminal device, a secure storage subsystem, and an interconnectivity component. The terminal device has a network...
US-9,294,914 Localized visible light communications among wireless communication devices
A method and apparatus for monitoring a localized region of a touch screen for a plurality of sensor inputs to identify a camera profile of at least one user...
US-9,294,913 Android-based secure handheld network access device and micro-USB version of IEEE 802.15.4 bridge for ACSD networks
This disclosure focuses on the development of a micro-usb module that allows a smart-device to transmit and receive IEEE 802.25.4 messages via a connection...
US-9,294,901 Synoptic emergency cellular device and system
A wearable emergency cellular device for use in a medical emergency alert situation includes an application containing synoptic medical information and other...
US-9,294,788 Method, cryptographic system and security module for descrambling content packets of a digital transport stream
A method and cryptographic system for descrambling content packets, included within a digital transport stream, having conditional access messages and header...
US-9,294,610 Emergency alert system and program for portable devices
A system and software application that communicates with a central service for alerting a security service that help is needed, wherein an application running...
US-9,294,575 Transmitting appliance-specific content to a user device
Methods and systems are presented for transmitting appliance-specific content to a user device associated with an appliance. In some embodiments, a third party...
US-9,294,511 Sending out-of-band notifications
Out-of-band notifications are used to inform users of clients of security policy enforcement actions, such as enforcement of a data loss prevention (DLP)...
US-9,294,507 Techniques for data security in a multi-tenant environment
The usage of data in a multi-tenant environment can be controlled by utilizing functionality at the hypervisor level of various resources in the environment....
US-9,294,500 System and method for creating and applying categorization-based policy to secure a mobile communications...
A server creates categorization-based application policies and selects a specific policy to send to a mobile communications device. In one embodiment, the...
US-9,294,498 Online portal for improving cybersecurity risk scores
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity....
US-9,294,494 Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
US-9,294,472 Apparatus and method for managing health data
An apparatus and method for managing health data through a user terminal are provided. The method includes inputting a user terminal number for identifying the...
US-9,294,469 Systems and methods for establishing a connection between an appliance and a home energy management device
The present disclosure provides systems and methods for establishing a connection between an appliance and a home energy management device. Upon being prompted...
US-9,294,463 Apparatus, method and system for context-aware security control in cloud environment
An apparatus, method and system for context-aware security control in a cloud environment are provided. The apparatus includes an authentication header...
US-9,294,449 Low latency active noise cancellation system with client intercommunication
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content...
US-9,294,448 Cryptographic security functions based on anticipated changes in dynamic minutiae
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
US-9,294,445 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,294,444 Systems and methods for cryptographically splitting and storing data
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,294,443 Secure integration of hybrid clouds with enterprise networks
A system and method of managing secure integration of a cloud-based computing resource with a private domain are disclosed. One system includes a hybrid cloud...
US-9,294,440 Secure inter-zone data communication
A proxy receives a message from a computing system in a trusted secure zone directed to a computing system outside the trusted secure zone. The proxy determines...
US-9,294,438 Cloud computing method and system
Methods and systems integrating sensitive or private data with cloud computing resources while mitigating security, privacy and confidentiality risks associated...
US-9,294,402 Router, method for controlling router, and program
A router includes an input section configured to receive data, a buffer section including a plurality of data storage sections and configured to store the data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.