Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,197,362 Global state synchronization for securely managed asymmetric network communication
The present invention provides a system and method is disclosed for the development and maintenance of a globally distributed state session table wherein a...
US-9,197,293 Mobile communications device providing secure element data management features and related methods
A mobile communications device may include a near field communications (NFC) device, an input device configured to generate a memory wipe command, a memory, and...
US-9,196,626 Semiconductor device
A semiconductor device with a novel structure in which storage capacity needed for holding data can be secured even with miniaturized elements is provided. In...
US-9,196,116 Securing gaming transactions
Providing tamper-evident transaction data for transactions relating to a draw or game event such as a lottery or other game of chance or skill. The...
US-9,196,110 System and method for dynamic FOB synchronization and personalization
A system generally for personalizing and synchronizing fob data in the context of a distributed transaction system is disclosed. A dynamic fob synchronization...
US-9,196,108 Apparatus and method of maintaining and repairing banknote validator using a network
There is provided an apparatus and a method of maintaining, repairing and/or optimizing a banknote validator using a network. The apparatus includes a banknote...
US-9,195,983 System and method for a secure cardholder load and storage device
A system for a secure cardholder and storage device includes a mobile communication device and a secure card transporter (SCT). The SCT includes a Near Field...
US-9,195,859 Selectively securing a hot-swappable data storage device to prevent data corruption
A method and computer program product secure a hot-swap data storage device against being manually physically removed from an operable position within a chassis...
US-9,195,845 Trusted and secure techniques for item delivery and execution
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a...
US-9,195,844 System and method for securing sensitive data
An approach is provided for securing data in a technical environment. In one embodiment, a processor obtains a first file, which when executed installs a first...
US-9,195,841 Automated and delegated model-based row level security
Business groups are created to secure business entities of a BI data model. In one aspect, a user to be secured is selected and a business group of the BI model...
US-9,195,839 Tape backup method
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,195,837 Method and system for securely transmitting deterrent data
A method for securely transmitting deterrent data includes generating a deterrent having a predesigned number and configuration of glyphs having deterrent data...
US-9,195,836 Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
US-9,195,830 System and method for unattended computer system access
A secure access system, method and patch management system for access to a remote computer system is disclosed. The remote computer system requires local...
US-9,195,822 Familiar dynamic human challenge response test content
Embodiments of the invention are directed to human challenge response test delivery systems and methods. Specifically, embodiments of the present invention are...
US-9,195,806 Security server for configuring and programming secure microprocessors
A security server for programming configuration settings and application images into a target device is disclosed. The security server includes two secure...
US-9,195,574 Systems, methods, and apparatuses for testing mobile device applications
Aspects of the present disclosure generally relate to systems and methods for facilitating optimization of mobile application testing. In one embodiment, a...
US-9,195,548 Information processing method and apparatus for recovering state of system
A disclosed information processing method is executed by a computer and includes: storing context representing a state of a processor in the computer into a...
US-9,195,492 Secure system time reporting
Technologies related to secure system time reporting are generally described. In some examples, responses to some system time requests may be manipulated to...
US-9,194,769 Systems and methods for environmental testing and evaluation of non-destructive inspection sensors
A system and method for environmental testing and evaluation of non-destructive inspection (NDI) sensors is provided. The system has a structure having a...
US-9,191,863 Bandwidth guaranteed system, radio node device and bandwidth guaranteeing method
To establish an alternative path without giving an influence on signal continuity to a data transmission line to which a communication bandwidth cannot be...
US-9,191,823 Mobile device and method to monitor a baseband processor in relation to the actions on an applicaton processor
A method and device to analyze the security of a mobile terminal having application and baseband processors are described. Various information may be acquired...
US-9,191,819 Security method for the verification of an information retrieval request
The invention is related to security method for the verification of an Information Retrieval Request (10) which requests a transmission of data (20) from a...
US-9,191,818 Methods and devices for OTA management of subscriber identity modules
Methods and devices in a mobile communications system for over the air management of mobile stations contain a secure identification element such as a...
US-9,191,813 System and method for managing OTA provisioning applications through use of profiles and data preparation
A method using a non-transitory processor for providing an application product including receiving an application profile, a key profile, a secure element (SE)...
US-9,191,810 Method and apparatus for handling handover procedure
The present invention provides a method for handling a handover procedure for a Radio Resource Control (RRC) layer in a user equipment (UE) of a wireless...
US-9,191,778 Method and system for global navigation satellite system configuration of wireless communication applications
Methods and systems for global positioning navigate satellite system configuration of wireless communication applications may comprise in a wireless...
US-9,191,522 Billing varied service based on tier
A mobile communication device that monitors and reports consumption of multi-tiered communication services is disclosed. The mobile communication device...
US-9,191,443 Managed peer-to-peer applications, systems and methods for distributed data access and storage
Applications, systems and methods for backing up data include securely connecting at least first and second privately addressed computers over a network,...
US-9,191,410 Method and apparatus for enhancing communication security
A method and apparatus can be configured to transmit indicators to a network entity. The indicators indicate whether security will be applied to a media data,...
US-9,191,407 Secure control for desktop secure video teleconferencing
Method, system, and computer program product example embodiments of the invention are disclosed to provide multi-network secure video teleconferencing (VTC) for...
US-9,191,403 Cyber security adaptive analytics threat monitoring system and method
A system and method of detecting command and control behavior of malware on a client computer is disclosed. One or more DNS messages are monitored from one or...
US-9,191,392 Security configuration
An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable...
US-9,191,391 Cross-domain object models for securely sharing information between network security domains
Techniques are described for controlling transfer of information in a secure manner across multiple network security domains. As described herein, cross-domain...
US-9,191,376 Securing digital content system and method
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or...
US-9,191,371 Network coding-based anonymous communication
A computer-based peer-to-peer anonymous networking using a coding scheme with a formal information theoretic security characterization to construct a...
US-9,191,368 Systems and methods for secure remote access
Embodiments of the disclosure can include systems and methods for secure remote transfers. The onsite monitoring system secure file transfer solution can allow...
US-9,191,367 Plant communication network
An embodiment of the disclosure provides a communication network having a plurality of end devices protected by multilayer switches that receive data packets in...
US-9,191,363 White-list firewall based on the document object model
Some embodiments provide firewalls and methods for guarding against attacks by leveraging the Document Object Model (DOM). The firewall renders the DOM tree to...
US-9,191,324 MAC aggregation with message multiplicity for use in a multi-node data network
A MAC aggregation technique utilizing a large field addition operation is disclosed. The large field addition operation defines the addition of two or more MACs...
US-9,191,211 Data security system
A data security system that includes a first memory device to store message data to be secured, a second memory device to store microcode including an...
US-9,191,202 Information processing device and computer program product
According to an embodiment, a device includes a processor unit, a control unit, a setting unit, a writing unit, and an executing unit. The processor unit is...
US-9,190,103 Data storage medium having security function and output apparatus therefor
Provided are a storage medium, which has a security function, for storing media content and an output apparatus for outputting data stored in the storage...
US-9,189,934 Security monitoring with programmable mapping
An integrated security arrangement is implemented in a variety of embodiments. In one such embodiment an integrated security arrangement includes a plurality of...
US-9,189,928 Tablet based kiosk
A tablet based kiosk to securely support a tablet such as a personal computer to receive, transmit and display information or data comprising a tablet mount...
US-9,189,807 In-network online storage with increased session bandwidth
A system includes a private communications network to provide content to a user using a first, base amount of bandwidth, a policy server, coupled to the...
US-9,189,783 Wireless mobile transaction system and the procedure for carrying out transactions with a mobile phone
The invention belongs to the field of systems for provision of computer-supported transactions with the use of a mobile phone, more exactly to the field of...
US-9,189,777 Electronic commerce with cryptographic authentication
A method for facilitating an authentication related to an electronic transaction between a first and a second user is provided. Authentication data is received...
US-9,189,657 Information processing apparatus, method of controlling same, and storage medium
An information processing apparatus which is capable of ensuring mutual security in cases where security information is displayed in a state in which an image...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.