Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,246,892 System, method and computer program product for managing access to systems, products, and data based on...
In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location...
US-9,246,889 Layered protection and validation of identity data delivered online via multiple intermediate clients
A method is provided for securely delivering identity data units over a communications network to a client device. The method includes receiving a selection...
US-9,246,888 Systems and methods for secure communication over an unsecured communication channel
A system and method for secure data transmission over an unsecured communication channel by means of public key cryptography is disclosed. A plurality of...
US-9,246,887 Method and apparatus for securing confidential data for a user in a computer
Method and apparatus for securing confidential data related to a user in a computer is described. In one example, rules are obtained that provide a...
US-9,246,886 Device for and method of handling sensitive data
A device for handling sensitive data comprises a first integrated circuitry forming a first trust zone and a second integrated circuitry forming a second trust...
US-9,246,885 System, method, apparatus and computer programs for securely using public services for private or enterprise...
A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one...
US-9,246,883 Subscriber identity module provisioning
The exemplary embodiments of the invention include inputting, at a device, a voucher having a plurality of data fields, where the voucher provides provisional...
US-9,246,881 Method and system for securing the exchange of data between a client module and a server module
A method for securing the exchange of data between a client module and a server module includes steps where: the token module initializes a token and the client...
US-9,246,740 Methods, systems, and products for security systems
Methods, systems, and products notify of alarms in security systems. An alarm message is received from a security system associated with a network address. The...
US-9,246,679 Apparatus and method for negotiating pairwise master key for securing peer links in wireless mesh networks
A system and method for negotiating a pairwise master key ("PMK") in wireless mesh networks. The system includes a plurality of mesh points that are configured...
US-9,246,678 Secure cloud storage and encryption management system
An embodiment of the invention allows a user to back-up/store data to a cloud-based storage system and synchronize that data on the user's devices coupled to...
US-9,246,677 Method and system for secure data communication between a user device and a server
The present disclosure discloses a method, a system and a computer program product for secure data communication between a user device and a server. User...
US-9,246,676 Secure access for encrypted data
Embodiments generally provide techniques for managing data security. One embodiment includes providing, at a client system, an encrypted private key that can be...
US-9,246,673 Taste-based authentication to securely share data
Examples are disclosed for transforming a multi-dimensional attribute value for a taste related to an area of interest for a user of a computing device and...
US-9,245,470 Display device
Provided is to secure a data-writing period to a source line and reduce the number of the IC chips used. N image data (e.g., three image data, RGB) are...
US-9,245,416 Secure identification devices and methods for detecting and monitoring access thereof
A game token having a counter system including a denomination value, a housing, and a token identification element at least partially contained within the...
US-9,245,405 Cabinet system
A cabinet system for securely storing items includes a cabinet housing, a controller, and at least one drawer unit. The cabinet housing has a locking mechanism,...
US-9,245,244 System and method for enabling product development
A comprehensive platform for developing digital products. A standardized process is applied to a product development effort and an online portal provides tools...
US-9,245,212 Printing system and printing method wherein print data formed by print data forming device are printed by...
A printing device, a printing system, a program, and a printing method for improving security and user-friendliness are disclosed. The printing system (1)...
US-9,245,150 Semantically determining a security classification of data
Disclosed herein is a method for determining a security classification for data that includes generating a classification signature for data based on a semantic...
US-9,245,148 Secure storage and accelerated transmission of information over communication networks
A system and method for securely obfuscating, storing, and transmitting digital information includes a computing device configured to parse at least a portion...
US-9,245,147 State machine reference monitor for information system security
A method and system for securing operating domains. The method includes receiving a captured communication, generating an event data record corresponding to the...
US-9,245,144 Secure data container for web applications
Systems and methods may provide for identifying web content and detecting an attempt by the web content to access a local data store. Additionally, a...
US-9,245,143 Security policy for device data
Techniques for providing security policy for device data are described. In implementations, data on a device is stored in an encrypted form. To protect the...
US-9,245,140 Secure data encryption in shared storage using namespaces
A data storage device in a distributed computing system has physical block addresses that are each allocated to multiple namespaces. To access the data storage...
US-9,245,131 Multi-user universal serial bus (USB) key with customizable file sharing permissions
A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as...
US-9,245,130 Multi-user universal serial bus (USB) key with customizable file sharing permissions
A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as...
US-9,245,126 Protection of user data in hosted application environments
A method of converting an original application into a cloud-hosted application includes splitting the original application into a plurality of application...
US-9,245,120 Method and apparatus for retroactively detecting malicious or otherwise undesirable software as well as clean...
The present invention relates to the security of general purpose computing devices, such as laptop or desktop PCs, and more specifically to the detection of...
US-9,245,116 Systems and methods for remote monitoring, security, diagnostics, and prognostics
A system includes a physical analysis module, a cyber analysis module, and a determination module. The physical analysis module is configured to obtain physical...
US-9,245,102 Combining navigation and fingerprint sensing
A method, device and machine readable medium are provided. The method comprises: activating a fingerprint sensor while performing a function other than...
US-9,244,862 Secure storage device permanently disabled by remote command
A communication and security device for a portable computer is disclosed including a housing, a connector provided on the housing for physical connection to the...
US-9,244,639 Secure, server-less print release
A print release environment includes a client computing device, an imaging device and an active directory. The client stores an imaging job on a local hard...
US-9,244,627 Secure data erasure system for erasing a plurality of data storage devices
An erasure system and method for sorting, tracking, and erasing a plurality of data storage devices using enterprise hardware and software designed for data...
US-9,244,133 Handheld devices and structures to detect sticky devices having magnets
Apparatus and methods for detecting concealed personal security threats may comprise conventional mirrors and less conventional arrays of Hall-effect sensors...
US-9,241,058 Mobile communication apparatus having anti-theft and auto-notification functions
A mobile communication apparatus comprises an anti-theft control circuit and a transmission control circuit. The anti-theft control circuit has an information...
US-9,240,996 Method and system for risk-adaptive access control of an application action
Risk-adaptive access control techniques are disclosed. In various embodiments, a value for a threat level attribute is determined based at least in part on...
US-9,240,989 Apparatus and method for secure over the air programming of a communication device
A system that incorporates the subject disclosure may perform, for example, receiving an over-the-air programming message that is utilizing a hypertext transfer...
US-9,240,976 Systems and methods for providing network security monitoring
Systems and methods are disclosed for providing security monitoring in a computer network, in an embodiment, a service accessible via a network port of a...
US-9,240,975 Security device implementing network flow prediction
A security device for processing network flows is described, including: one or more packet processors configured to receive incoming data packets associated...
US-9,240,889 Method and system for secure data access among two devices
An embodiment of the present invention provides a method for secure data access among two devices. The method comprises: retrieving unique information...
US-9,240,009 Mobile devices for commerce over unsecured networks
Techniques for managing modules or applications installed in a mobile device are described. To provide authentic and secured transactions with another device,...
US-9,239,951 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
An adaptive interface, predicting a desired user function, based on user history, as well as machine internal status and context. An input is predicted, and the...
US-9,239,938 Data holder, system and method
A protective data holding vault that includes a module with onboard memory that can be configured as a drive, e.g. flash drive, attached to a machine or...
US-9,239,937 Targeted security policy override
An aspect provides a method, including: gathering, with an information handling device, client system identification data of a client system; providing, with...
US-9,239,933 Piracy prevention and usage control system using access-controlled encrypted data containers
This is a system for controlling and restricting access (reading, writing, creating, deleting, manipulating, and control) to data and data representations of...
US-9,239,932 Secure handling of user related information between web applications
Methods and arrangements in a client node and a server node for supporting secure handling of information related to a user, said information being stored by...
US-9,239,925 Processor security
A device comprises a processor arranged to automatically execute boot code upon start-up or reset. The boot code comprises a code authentication procedure to...
US-9,239,920 Generation of working security key based on security parameters
Techniques for improving security of an electronics device are disclosed. In one aspect of the present disclosure, security of a device may be improved by...
US-9,239,802 System and method for protecting a plug server using encryption techniques without internet connectivity
Various systems, computer program products, and methods for securing a plug server and its data are described. According to the invention, the plug server will...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.