Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,205,024 Intravenous medication delivery safety assembly
An intravenous medication delivery safety assembly insures proper medication is delivered to a patient. The assembly includes an IV bag holding a medication. A...
US-9,204,305 Method for transmitting data in a sensor network, sensor node and central processor
A method for transmitting data in a sensor network, which comprises at least one sensor node and a central processor, is provided. The at least one sensor node...
US-9,203,980 Unit using operating system and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitoring memory (CRUM) unit used in an image forming job includes a central processing unit (CPU) with an...
US-9,203,902 Securely and reliably storing data in a dispersed storage network
A method begins by ingesting distributed storage (DS) units of a set of DS units storing respective portions of data. The method continues with each of the...
US-9,203,865 Cluster architecture for network security processing
A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device,...
US-9,203,853 Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
US-9,203,851 Redirection of data from an on-premise computer to a cloud scanning service
An on-premise computer in the form of an on-premise gateway receives data transmitted by a client to an intended destination server. The on-premise gateway and...
US-9,203,843 Mobile device enabled tiered data exchange via a vehicle
A mobile device enabled tiered data exchange via a vehicle is disclosed. A mobile device can access profile information related to a tiered-data sharing...
US-9,203,836 Token for securing communication
In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest...
US-9,203,832 DTCP certificate authentication over TLS protocol
Authenticating devices utilizing Transport Layer Security (TLS) protocol to facilitate exchange of authentication information or other data to permit or...
US-9,203,815 Systems and methods for secure third-party data storage
A computer-implemented method for secure third-party data storage may include (1) identifying, at a server-side computing system, a data access request from a...
US-9,203,808 Method and system for management of security rule set
There are provided a method of automated managing an ordered set of security rules implemented at a plurality of security gateways and a system thereof. The...
US-9,203,801 Storage gateway security model
Methods, apparatus, and computer-accessible storage media for implementing a gateway to a remote service provider according to a security model. The gateway...
US-9,203,614 Method, apparatus, and system for protecting cloud data security
The present invention relates to a method, an apparatus, and a system for protecting cloud data security. A key management center encrypts original data M sent...
US-9,203,608 System for encrypting data with an error correction code
An encryption method and apparatus is provided for increasing the security of encrypted data by puncturing or repeating a part of coded data. The data...
US-9,202,662 Charged particle lithography system with a long shape illumination beam
A system includes an integrated circuit (IC) design data base having a feature, a source configured to generate a radiation beam, a pattern generator (PG)...
US-9,202,327 Method for checking the production quality of an optical security feature of a value document
A method for checking the production quality of a prescribed optical security feature in or on a prescribed portion of a value document on the basis of pixel...
US-9,202,323 Secure electronic compartment identifier system
A latch, or tag that can be used on luggage, baggage, trunks, rail cars, trailers or any compartment that can be opened and closed that establishes profile data...
US-9,202,102 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,202,084 Security facility for maintaining health care data pools
Disclosed herein are systems and methods for syndication and management of structured and unstructured data to assist institutional healthcare delivery,...
US-9,202,082 Secure data sharing with publicly accessible computing nodes
An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the...
US-9,202,076 Systems and methods for sharing data stored on secure third-party storage platforms
A computer-implemented method for sharing data stored on secure third-party storage platforms may include (1) identifying a request from a client system for a...
US-9,202,073 Security measures for data protection
This document discusses, among other things, security measures for shielding or protecting data or sensitive signals on an integrated circuit (IC). The systems...
US-9,202,071 Exception handling in a data processing apparatus having a secure domain and a less secure domain
A data processing apparatus and method are provided for handling exceptions, including processing circuitry configured to perform data processing operations in...
US-9,202,070 Input/output gatekeeping
Disclosed are various embodiments providing a portable wireless communication device that includes a secure element configured to route a set of input/output...
US-9,202,067 Controlling an analysis system of biological samples
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a...
US-9,201,616 Image communication apparatus, method and storage medium with archiving function
There is provided with an image communication apparatus. A designation unit designates a destination of image data. A transmission unit transmits the image data...
US-9,201,615 Image forming device and method for displaying image information
A determination unit determines whether or not an image forming device is a pre-designated image forming device by using specifying information when security...
US-9,201,591 Automated coverage monitoring of mobile applications
Embedded devices, such as smart phones, can execute an application for performing a set of discrete tasks. To evaluate applications for security ...
US-9,201,456 Digital lanyard for securing data on portable devices
A data securing system includes a digital lanyard having a first end portion connected with a first line, having a first connector portion, and a second line...
US-9,201,131 Secure routing based on degree of trust
A system, method, and apparatus for secure routing based on a degree of trust are disclosed herein. The disclosed method involves assigning a level of trust to...
US-9,198,152 Method for a secure detach procedure in a radio telecommunication network
A method for performing a detach of a terminal registered to a telecommunication network is disclosed. The detach is performed by associating an identification...
US-9,198,117 Network system with common secure wireless message service serving multiple applications on multiple wireless...
Each of several mobile end-user devices contains a device messaging agent that securely communicates with a network message server over a wireless network. The...
US-9,198,042 Security techniques for device assisted services
Methods and systems for receiving a report from an end-user device, the report comprising information about a device service state; determining, based on the...
US-9,197,696 Offline content distribution networks
Approaches, techniques, and mechanisms are disclosed for the secure distribution of media content to devices having minimal or no Internet connectivity....
US-9,197,668 Access control to files based on source information
The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be...
US-9,197,654 Rootkit detection by using HW resources to detect inconsistencies in network traffic
A technique allows detection of covert malware that attempts to hide network traffic. By monitoring network traffic both in a secure trusted environment and in...
US-9,197,652 Method for detecting anomalies in a control network
A method for monitoring and controlling, industrial or building automation to detect anomalies in a control network, wherein a technology of an intrusion...
US-9,197,648 System and method for verifying the identity of an internet user
A system and method for verifying the identity of an Internet user are disclosed. In at least one embodiment, a central computing system is configured for...
US-9,197,644 System and method for multitenant management of domains
In one embodiment, a method is performed on a multitenant shared-resources system for each managed domain of a plurality of managed domains. The method includes...
US-9,197,639 Method for sharing data of device in M2M communication and system therefor
The present invention relates to a method for sharing data of a device in M2M communication and a system therefor. The invention comprises: a step of allowing a...
US-9,197,635 Remote verification of user presence and identity
A system for verifying the presence and identity of a user on a remote computer having a server connected to a network, the network being connected to one or...
US-9,197,633 Methods and apparatuses for securely operating shared host computers with portable apparatuses
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable...
US-9,197,632 System and method for account access
The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a...
US-9,197,619 Management of multiple devices registered to a user
A system and method for managing electronic devices based on user identity information is presented. An authenticating entity authenticates and provides secure...
US-9,197,615 Method and system for providing access-specific key
An access specific key is provided for securing of a data transfer between a mobile terminal and a node of an access net. For authentication of the mobile...
US-9,197,521 Cloud based logging service
Methods and systems are provided for providing access to a cloud-based logging service to a user without requiring user registration. According to one...
US-9,197,419 Security system for data stored in the cloud
A cloud access security system provides security to data stored in the cloud. The cloud access security system maintains version service information that...
US-9,197,413 Hybrid secure communication system and method
Systems and methods for securely communicating between a mobile computing device and a vehicle system are provided. A method includes receiving authentication...
US-9,197,408 Systems and methods for providing a secure data exchange
A system, a method, and a computer program product for a data exchange are provided. A first application generates a first key for exchange of data between the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.