Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,350,540 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-9,350,532 System and method for conducting searches at target devices
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method...
US-9,349,287 System for obtaining vehicular traffic flow data from a tire pressure monitoring system
An embedded Tire Pressure Monitoring sensor is incorporated into vehicular wheels and a secured central server is used to track the unique identification code...
US-9,349,027 Smart hybrid card system providing authenticity, privacy, and security (APS)
An RFID/MFID system includes a tag and a reader. The tag is adapted to provide an RF identification signature when interrogated with an electric travelling wave...
US-9,349,023 Database encryption system, method, and program
A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that...
US-9,349,018 Preventing content data leak on mobile devices
Preventing enterprise or other protected content data from "leaking" from being under secure management on a device, for example by virtue of being viewed using...
US-9,349,015 Programmatically detecting collusion-based security policy violations
Sets of multiple software programs selected from a set of candidate software programs are evaluated to determine if the applications can collude to violate a...
US-9,348,991 User management of authentication tokens
A computer implemented method, a computer program product, and a data processing system manage a set of federated log-in authentications at secure web sites. A...
US-9,348,980 Methods, systems and application programmable interface for verifying the security level of universal resource...
The present disclosure discloses a method of allowing WebView to verify the security level of a web content and inform the user with regards to the security and...
US-9,348,879 Data lineage transformation analysis
Resources for data lineage discovery, data lineage analysis, role-based security, notification. The resources may include or involve machine readable memory...
US-9,348,864 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Secure and remote operation of a remote computer from a local computer over a network includes authenticating at least one remote computer for connection to at...
US-9,348,856 Data movement from a database to a distributed file system
Provided are techniques for data movement. An activity is created that overrides existing security, that is associated with a user, that defines one or more...
US-9,348,789 Computer system and network interface supporting class of service queues
A data processing system adapted for high-speed network communications, a method for managing a network interface and a network interface for such system, are...
US-9,348,768 Method for implementing encryption in storage card, and decryption method and device
A method for implemented encryption in a memory card, and a decryption method and device, and the method includes: receiving an input encryption key; requesting...
US-9,348,626 Mobile device maintaining adequate security and data partitioning between user mode and business mode
One or more embodiments of the invention facilitate switching between a host environment of a mobile device and a guest environment of the mobile device. One...
US-9,348,575 Update of a data-carrier application
In a method for updating or installing a data storage medium application which can be executed on a secure data storage medium, the data storage medium is used...
US-9,348,553 Electronic display tiling apparatus and method thereof
Disclosed is a method and apparatus for substantially eliminating the appearance of seams between tiled panels of a display. Non-imaging magnification may be...
US-9,347,782 System and method for sharing a travel itinerary with a protective detail
A system for sharing a travel itinerary with a plurality of members of a protective detail tasked with protecting the security of an individual, includes one or...
US-9,345,053 Synoptic emergency cellular device and system
A wearable emergency cellular device for use in a medical emergency alert situation includes an application containing synoptic medical information and other...
US-9,345,040 Securing transmit openings
A technique for securing transmit opening helps enhance the operation of a station that employs the technique. The technique may facilitate low latency response...
US-9,344,895 Method and system for securely accessing portable hotspot for intelligent mobile phones
A method and a system for securely accessing a portable hotspot for intelligent mobile phones, comprises an intelligent mobile phone used as an AP and another...
US-9,344,892 Mobile device authentication and call routing using dual-tone multi-frequency signaling
Methods and apparatuses are described for mobile device authentication and call routing using dual-tone multi-frequency signaling. A server computing device...
US-9,344,832 Methods and apparatus for delivering electronic identification components over a wireless network
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or...
US-9,344,616 Correlation engine for security, safety, and business productivity
The present invention is a correlation engine for use in security, safety, and business monitoring applications. Sensory data from one or more sensors are...
US-9,344,559 Method and device for the legally secure archiving of telephone contents
The present invention relates to a method and a device for the legally secure archiving of telephone contents. In particular, it should be possible to provide a...
US-9,344,484 Determining consistencies in staged replication data to improve data migration efficiency in cloud based networks
Embodiments relate to systems and methods for data migration among a plurality of cloud-based storage networks. In aspects, an administrator of a data payload...
US-9,344,457 Automated feedback for proposed security rules
A computer determines a number of matches returned by a proposed security rule that result from application of the proposed security-rule to historical logged...
US-9,344,456 Distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-9,344,421 User access authentication based on network access point
Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a...
US-9,344,410 Telecommunication method for securely exchanging data
The invention provides for a telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer...
US-9,344,378 Shared community storage network
A hardware and/or software facility for durably and securely storing data within a shared community storage network. A user may have a storage device that they...
US-9,344,278 Secure data transfer using random ordering and random block sizing
Encrypted information is conventionally broken into blocks which are transmitted sequentially. Because the order and the size of such blocks can be easily...
US-9,344,275 System, device, and method of secure entry and handling of passwords
Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure...
US-9,344,185 System and method for secure pairing of bluetooth devices
A system of securely paired Bluetooth devices includes a host device and a peripheral device, where each device includes an audio interface and a Bluetooth...
US-9,343,929 Dual mode wireless power receiver
A dual mode wireless power receiver (DMWPR) selectively applying a received power to a load device and utilizing at least a part of the power to power-up,...
US-9,342,951 Wagering game establishment data import/export architecture
A secure architecture can provide a wagering game establishment access to the utility and entertainment value of online social communities. An architecture that...
US-9,342,935 Smartphone based system for vehicle monitoring security
An apparatus and method for monitoring a vehicle. Some embodiments include: capturing and securely storing OBD and location data from the vehicle, maintaining...
US-9,342,711 Systems and methods for controlling access to peripherals of a computer system by software applications
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each...
US-9,342,708 Management of application access
Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls...
US-9,342,706 Secure desktop applications for an open computing platform
Example secure desktop applications for an open computing platform are disclosed. An example secure desktop method for a computing platform disclosed herein...
US-9,342,702 Controlling an analysis system of biological samples
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a...
US-9,342,700 Implementing enhanced security with storing data in DRAMs
A method, system and memory controller for implementing enhanced security in a memory subsystem including DRAM in a computer system. A memory includes a...
US-9,342,697 Scalable security policy architecture for data leakage prevention
One embodiment relates to an apparatus for creating and managing security policies for data leakage prevention. The apparatus includes a database which stores...
US-9,342,695 Secured automated or semi-automated systems
Secured automated or semi-automated systems are provided herein. In one embodiment, a sensor system includes a sensor, a legacy computing environment that is...
US-9,342,694 Security method and apparatus
In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising: at least one processor; and at least one memory...
US-9,342,680 Security token, data processing system and method of processing data
According to an aspect of the invention, a security token is conceived, in particular a smart card, comprising a tactile sensing user interface, wherein said...
US-9,342,677 Method and apparatus to provide continuous authentication based on dynamic personal information
An authentication method, system and device are provided to continuously collect dynamic personal identification data (DPID) samples through a user device by...
US-9,342,661 Apparatus and methods for rights-managed content and data delivery
Methods and apparatus for providing access to content across a plurality of devices and environments. In one embodiment, a downloadable rights profile is...
US-9,342,587 Computer-implemented information reuse
Embodiments of the present invention relate to an approach for reusing information/knowledge. Specifically, embodiments of the present invention provide an...
US-9,342,331 Secure virtualized mobile cellular device
Secure virtualizing of a mobile cellular device uses a cellular communication network having base transceiver station edge node servers. A virtualized-instance...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.