Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,208,330 System for execution of security related functions
An apparatus having a first memory circuit, a plurality of arithmetic modules, and a plurality of second memory circuits. The first memory circuit may be...
US-9,208,326 Managing and predicting privacy preferences based on automated detection of physical reaction
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
US-9,208,325 Protecting data on a mobile device
A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a "data...
US-9,208,319 Code base partitioning system
The subject disclosure is directed towards partitioning a code base of a program into a trusted portion and an untrusted portion. After identifying sensitive...
US-9,208,310 System and method for securely managing enterprise related applications and data on portable communication devices
A system and computer-implemented method for securely managing enterprise related applications and associated data on one or more portable communication devices...
US-9,208,309 Dynamically scanning a web application through use of web traffic information
Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application...
US-9,208,295 Policy-based control layer in a communication fabric
Presented herein are techniques for adding a secure control layer to a distributed communication fabric that supports publish-subscribe (pub-sub) and direct...
US-9,208,284 Medical professional application integration into electronic health record system
Embodiments relate to integrating data collection and productivity applications with an EHR system. To integrate a patient's data collection application with...
US-9,208,034 Determining security holes of a backup image
A system and method provide for backing up and restoring using patch level data for operating system and application files. Patch level data for the files in...
US-9,207,895 Image forming apparatus that stores data of print job in memory area, method of controlling image forming...
A image forming apparatus capable of performing reservation printing, even when incapable of storing print data in a memory unit due to an insufficient free...
US-9,207,772 Motion-based identity authentication of an individual with a communications device
Systems, methods and computer storage mediums securely authenticate an identity of an individual based on a pattern that is traced by the individual....
US-9,207,174 Apparatus and method for characterizing a replica tape
An apparatus and method are provided for characterizing a replica tape which has been embossed, compressed or cast on a surface of a material to be measured to...
US-9,207,044 Sight adapter for handheld mortar system
A sight adapter for a handheld mortar that is secured directly to the mortar tube and provides a standardized mounting system for a weapon sight. The sight...
US-9,205,024 Intravenous medication delivery safety assembly
An intravenous medication delivery safety assembly insures proper medication is delivered to a patient. The assembly includes an IV bag holding a medication. A...
US-9,204,305 Method for transmitting data in a sensor network, sensor node and central processor
A method for transmitting data in a sensor network, which comprises at least one sensor node and a central processor, is provided. The at least one sensor node...
US-9,203,980 Unit using operating system and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitoring memory (CRUM) unit used in an image forming job includes a central processing unit (CPU) with an...
US-9,203,902 Securely and reliably storing data in a dispersed storage network
A method begins by ingesting distributed storage (DS) units of a set of DS units storing respective portions of data. The method continues with each of the...
US-9,203,865 Cluster architecture for network security processing
A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device,...
US-9,203,853 Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
US-9,203,851 Redirection of data from an on-premise computer to a cloud scanning service
An on-premise computer in the form of an on-premise gateway receives data transmitted by a client to an intended destination server. The on-premise gateway and...
US-9,203,843 Mobile device enabled tiered data exchange via a vehicle
A mobile device enabled tiered data exchange via a vehicle is disclosed. A mobile device can access profile information related to a tiered-data sharing...
US-9,203,836 Token for securing communication
In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest...
US-9,203,832 DTCP certificate authentication over TLS protocol
Authenticating devices utilizing Transport Layer Security (TLS) protocol to facilitate exchange of authentication information or other data to permit or...
US-9,203,815 Systems and methods for secure third-party data storage
A computer-implemented method for secure third-party data storage may include (1) identifying, at a server-side computing system, a data access request from a...
US-9,203,808 Method and system for management of security rule set
There are provided a method of automated managing an ordered set of security rules implemented at a plurality of security gateways and a system thereof. The...
US-9,203,801 Storage gateway security model
Methods, apparatus, and computer-accessible storage media for implementing a gateway to a remote service provider according to a security model. The gateway...
US-9,203,614 Method, apparatus, and system for protecting cloud data security
The present invention relates to a method, an apparatus, and a system for protecting cloud data security. A key management center encrypts original data M sent...
US-9,203,608 System for encrypting data with an error correction code
An encryption method and apparatus is provided for increasing the security of encrypted data by puncturing or repeating a part of coded data. The data...
US-9,202,662 Charged particle lithography system with a long shape illumination beam
A system includes an integrated circuit (IC) design data base having a feature, a source configured to generate a radiation beam, a pattern generator (PG)...
US-9,202,327 Method for checking the production quality of an optical security feature of a value document
A method for checking the production quality of a prescribed optical security feature in or on a prescribed portion of a value document on the basis of pixel...
US-9,202,323 Secure electronic compartment identifier system
A latch, or tag that can be used on luggage, baggage, trunks, rail cars, trailers or any compartment that can be opened and closed that establishes profile data...
US-9,202,102 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,202,084 Security facility for maintaining health care data pools
Disclosed herein are systems and methods for syndication and management of structured and unstructured data to assist institutional healthcare delivery,...
US-9,202,082 Secure data sharing with publicly accessible computing nodes
An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the...
US-9,202,076 Systems and methods for sharing data stored on secure third-party storage platforms
A computer-implemented method for sharing data stored on secure third-party storage platforms may include (1) identifying a request from a client system for a...
US-9,202,073 Security measures for data protection
This document discusses, among other things, security measures for shielding or protecting data or sensitive signals on an integrated circuit (IC). The systems...
US-9,202,071 Exception handling in a data processing apparatus having a secure domain and a less secure domain
A data processing apparatus and method are provided for handling exceptions, including processing circuitry configured to perform data processing operations in...
US-9,202,070 Input/output gatekeeping
Disclosed are various embodiments providing a portable wireless communication device that includes a secure element configured to route a set of input/output...
US-9,202,067 Controlling an analysis system of biological samples
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a...
US-9,201,616 Image communication apparatus, method and storage medium with archiving function
There is provided with an image communication apparatus. A designation unit designates a destination of image data. A transmission unit transmits the image data...
US-9,201,615 Image forming device and method for displaying image information
A determination unit determines whether or not an image forming device is a pre-designated image forming device by using specifying information when security...
US-9,201,591 Automated coverage monitoring of mobile applications
Embedded devices, such as smart phones, can execute an application for performing a set of discrete tasks. To evaluate applications for security ...
US-9,201,456 Digital lanyard for securing data on portable devices
A data securing system includes a digital lanyard having a first end portion connected with a first line, having a first connector portion, and a second line...
US-9,201,131 Secure routing based on degree of trust
A system, method, and apparatus for secure routing based on a degree of trust are disclosed herein. The disclosed method involves assigning a level of trust to...
US-9,198,152 Method for a secure detach procedure in a radio telecommunication network
A method for performing a detach of a terminal registered to a telecommunication network is disclosed. The detach is performed by associating an identification...
US-9,198,117 Network system with common secure wireless message service serving multiple applications on multiple wireless...
Each of several mobile end-user devices contains a device messaging agent that securely communicates with a network message server over a wireless network. The...
US-9,198,042 Security techniques for device assisted services
Methods and systems for receiving a report from an end-user device, the report comprising information about a device service state; determining, based on the...
US-9,197,696 Offline content distribution networks
Approaches, techniques, and mechanisms are disclosed for the secure distribution of media content to devices having minimal or no Internet connectivity....
US-9,197,668 Access control to files based on source information
The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be...
US-9,197,654 Rootkit detection by using HW resources to detect inconsistencies in network traffic
A technique allows detection of covert malware that attempts to hide network traffic. By monitoring network traffic both in a secure trusted environment and in...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.