Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,258,452 Altering scans to include security features identifying scan origination
Systems and methods scan a previously printed sheet using a scanner to create an original scan, and evaluate the original scan to identify marks printed on the...
US-9,258,383 Monetization of television audience data across muliple screens of a user watching television
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with...
US-9,258,332 Distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-9,258,329 Dynamic access control policy with port restrictions for a network security appliance
A network security appliance supports definition of a security policy to control access to a network. The security policy is defined by match criteria including...
US-9,258,328 Identifying malicious devices within a computer network
This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more...
US-9,258,319 Detection of and responses to network attacks
Disclosed are various embodiments for detecting and responding to attacks on a computer network. One embodiment of such a method describes monitoring data...
US-9,258,315 Dynamic filtering for SDN API calls across a security boundary
Presented herein are techniques to reduce the vulnerabilities of network elements to malicious API calls. One or more filters that validate data across an API...
US-9,258,287 Secure active networks
A secure active network includes a plurality of secure elements which communicate with one another to share and log information such as identification,...
US-9,258,278 Unidirectional deep packet inspection
The invention relates to a communication device (1) comprising a processor configured to create a client handshake message in order to negotiate security...
US-9,258,276 Efficient packet handling, redirection, and inspection using offload processors
A method for handling packets is disclosed. The method can include providing at least one main processor connected to a plurality of offload processors by a...
US-9,258,275 System and method for dynamic security insertion in network virtualization
A method and apparatus for dynamic security insertion into virtualized networks is described. The method may include receiving, at a network device from a...
US-9,258,262 Mailbox-based communications system for management communications spanning multiple data centers and firewalls
System and methods for effecting communications between a trusted management process and one or more managed processes in a distributed computing environment...
US-9,258,122 Systems and methods for securing data at third-party storage services
A computer-implemented method for securing data at third-party storage services may include (1) receiving, at a server-side computing system, a request to...
US-9,258,116 System and methods for permitting open access to data objects and for securing data within the data objects
A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the...
US-9,258,115 Securing information exchanged via a network
A privacy key is provided over a network. An information page is provided over the network. A submission of data that is to be transmitted over the network in...
US-9,258,113 Username based key exchange
A method and apparatus for an system and process for sharing a secret over an unsecured channel in conjunction with an authentication system. A client computes...
US-9,258,111 Memory device which protects secure data, method of operating the memory device, and method of generating...
In one embodiment, the memory device includes a first memory area and a second memory area. The first memory area stores secure data. The first memory area is...
US-9,258,084 Method and implementation for network coefficents selection
A method and apparatus that improves the performance of TCP (and other protocols) in a data network by implementing segmenting the TCP path and implementing a...
US-9,258,036 Narrow and secure near field communication ring device
The present invention winds an antenna wire of a NFC (Near Field Communication) chip and antenna component round inside a hard concave ring, which is then...
US-9,256,762 Securing a remote database
A database access system may protect a field by storing the field as one or more underlying fields within a database. The database engine may not have access to...
US-9,256,758 Mode sensitive encryption
Mechanisms are provided to implement framework level mode specific file access operations. In a mode such as a work or enterprise mode, read and write accesses...
US-9,256,750 Secure credential unlock using trusted execution environments
Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user...
US-9,256,748 Visual based malicious activity detection
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
US-9,256,740 Method and system for analysis of security events in a managed computer network
An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event...
US-9,256,735 Detecting emergent behavior in communications networks
Systems and methods of detecting emergent behaviors in communications networks are disclosed. In some embodiments, a method may include decomposing a plurality...
US-9,256,732 Processing efficiency on secure systems having a host processor and smart card
A smart card comprising a data store and a processor, said smart card being operable to connect with a host data processing apparatus, said smart card...
US-9,256,727 Systems and methods for detecting data leaks
A computer-implemented method for detecting data leaks may include (1) monitoring at least one data-distribution channel utilized by an entity, (2) detecting a...
US-9,256,721 Mobile wireless hand-held biometric capture, processing and communication system and method for biometric...
A mobile, wireless biometric identification system includes a biometric capture device, associated software and processes which enable a commercially available...
US-9,256,613 Systems, methods, and computer program products for secure multi-enterprise storage
In one embodiment, a computer program product for storing data to a storage network includes a computer readable storage medium having program instructions...
US-9,256,551 Embedded encryption/secure memory management unit for peripheral interface controller
In an embodiment, a peripheral interface controller may include an inline cryptographic engine which may encrypt data being sent over a peripheral interface and...
US-9,256,499 Method and apparatus of securely processing data for file backup, de-duplication, and restoration
Disclosed are an apparatus and method of restoring at least one data file. The method may include retrieving the at least one data file to be restored from a...
US-9,256,444 Application level integration in support of a distributed network management and service provisioning solution
An integrated data network management and data service provisioning environment is provided. The integrated environment includes legacy software application...
US-9,253,640 In-store reading system
A system and method for providing digital data content to a wireless device. Although a fee is typically charged for access to the digital data content, e.g.,...
US-9,253,308 Portable computing device with data encryption and destruction
A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and...
US-9,253,288 Location-aware mobile connectivity and information exchange system
A computer platform and method for managing secure data transactions between user accounts on a server, based on the respective locations of mobile user devices...
US-9,253,234 Method and apparatus for providing enhanced streaming content delivery with multi-archive support using secure...
A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically...
US-9,253,210 Policy-based dynamic information flow control on mobile devices
A method for securing data on a mobile device that supports both enterprise and personal applications. According to the method, information flows and data...
US-9,253,209 Policy-based dynamic information flow control on mobile devices
A system is provided for securing data on a mobile device that supports both enterprise and personal applications. According to the technique, information flows...
US-9,253,204 Generating accurate preemptive security device policy tuning recommendations
An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a...
US-9,253,198 Systems and methods for geolocation-based authentication and authorization
Systems and methods are provided for controlling the authentication or authorization of a mobile device user for enabling access to the resources or...
US-9,253,187 Computer system and method
A method for use in a simplified login system, involving operating a computer to identify user name, password and submit fields on a remote website. The method...
US-9,253,176 Computerized method and system for managing secure content sharing in a networked secure collaborative exchange...
In embodiments of the present invention improved capabilities are described for securely sharing computer data content that allows for the secure un-sharing of...
US-9,253,171 Distributed network encryption key generation
Embodiments of methods and network devices for securing data within a network are generally described herein. One such method includes a key aggregation server...
US-9,253,170 Method and apparatus for securing mobile applications
In some embodiments, a method includes obtaining an object code of an application executed on a mobile device. The application is created by an author different...
US-9,253,167 Device and system for facilitating communication and networking within a secure mobile environment
The present invention relates generally to facilitating secure voice and data communication by way of a commercially available communication device (i.e.,...
US-9,253,162 Intelligent card secure communication method
The present invention relates to the field of information security. Disclosed is an intelligent card secure communication method, capable of preventing the...
US-9,253,160 Methods, systems, and media for secure connection management and automatic compression over metered data...
Methods, systems and media for facilitating compression over a metered data connection are provided. In some embodiments, the methods comprise: detecting a new...
US-9,253,152 Applying a packet routing policy to an application session
A security gateway includes packet routing policies, each including a host network address, an application network address, and a forwarding interface. In...
US-9,252,977 Method and system for an uncompromising connection from a computing device having information storage like...
A system for sending data from at least one computing device, which may be an email server, located at a user location, to a plurality of handsets. The system...
US-9,252,963 Performing multicast communication in computer networks by using overlay routing
An overlay protocol and system for allowing multicast routing in the Internet to be performed at the application level. The overlay protocol uses "native"...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.