Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,213,930 Secure barcodes
Methods and systems for generating and authenticating barcodes and in particular generating secure barcodes are disclosed. In one embodiment, a method,...
US-9,213,867 Secure cloud database platform with encrypted database queries
A cloud computing service to securely process queries on a database. A security device and method of operation are also disclosed. The security device may be...
US-9,213,859 Securing user data in cloud computing environments
Systems and methods for obfuscating user data in a remote web-based application are disclosed. According to one method, user inputs to a displayed web page of...
US-9,213,857 Systems and methods for securing data in motion
The systems and methods of the present invention provide a solution that makes data provably secure and accessible--addressing data security at the bit...
US-9,213,836 System and method for comprehensive general electric protection for computers against malicious programs that...
In the prior art of computer security by default programs are allowed to do whatever they like to other programs or to their data files or to critical files of...
US-9,213,832 Dynamically scanning a web application through use of web traffic information
Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application...
US-9,213,828 Data processing apparatus and method for protecting secure data and program code from non-secure access when...
A data processing apparatus includes processing circuitry and a data store including a plurality of regions including a secure region and a less secure region....
US-9,213,827 Security data aggregation and business intelligence for web applications
Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources...
US-9,213,811 Methods and systems for improving the security of secret authentication data during authentication transactions
A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret...
US-9,213,804 Securing displayed information
A method, system or computer usable program product for securing displayed information including establishing a session between a first data processing device...
US-9,213,764 Encrypted in-memory column-store
Embodiments relate to processing encrypted data, and in particular to identifying an appropriate layer of encryption useful for processing a query. Such...
US-9,213,729 Application recommendation system
Systems and method for receiving mobile device usage data from mobile electronic devices using security applications with enhanced access privileges. The mobile...
US-9,213,648 System, apparatus, and method of securely erasing cache
A computer-executable method, system, and computer program product for managing a data storage system, wherein the data storage system includes a cache and a...
US-9,213,624 Application quality parameter measurement-based development
A development environment provides warnings based on one or more application categories set for an application. Each warning has a trigger threshold and a...
US-9,210,579 System and method for communicating in a wireless communications system
A system and method for communicating in a wireless communications system are provided. A communications system includes a macro subnet, and a macro subnet...
US-9,210,573 Method and apparatus for registering a computing device with a service provider
A method and apparatus for providing authentication of a computing device with a communications service. A subscriber identity module image is transmitted to...
US-9,210,571 Secure wireless communication
A method in accordance with one embodiment of the invention may include receiving a first encryption key. A second encryption key may be generated, and a first...
US-9,210,194 Method and system for protecting data flow at a mobile device
A method and system for evaluating and enforcing a data flow policy at a mobile computing device includes a data flow policy engine to evaluate data access...
US-9,210,190 Leveraging digital security using intelligent proxies
A method for protecting data is disclosed that protects not only who may access data but also how it is used. This invention uses an intelligent proxy which...
US-9,210,186 System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file associated with an insurance...
US-9,210,184 Determining the vulnerability of computer software applications to attacks
Determining the vulnerability of computer software applications to attacks by identifying a defense-related variable within a computer software application that...
US-9,210,179 Systems, methods, and computer medium to securely transfer business transactional data between networks having...
Embodiments of computer-implemented methods, systems, and non-transitory computer-readable medium having one or more computer programs stored therein are...
US-9,210,146 Secure content transfer using dynamically generated optical machine readable codes
Technologies are generally described for peer-to-peer or peer-to-server-to-peer communication systems based on mobile devices, servers, and personal computers,...
US-9,210,139 Secure relay system
A method and apparatus for use in securely relaying data. The data is received by a first relay unit from a data provider. The data is sent by the first relay...
US-9,210,133 Method and system of providing authentication of user access to a computer resource via a mobile device using...
A method and system of authenticating a computer resource such as an application or data on a mobile device uses a contactless token to provide multi-factor...
US-9,209,975 Secure access of electronic documents and data from client terminal
An improved approach for secure access of electronic documents and data is provided.
US-9,208,493 Credit card security system and method
A transaction method, system and apparatus of the present invention employs two electromagnetically read cards. A first card is employed for accessing account...
US-9,208,456 Vehicle activity module
Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each...
US-9,208,366 Indicia decoding device with security lock
A securable indicia encoding system with a lock receiving portion is disclosed herein. In one illustrative embodiment, a securable indicia decoding device may...
US-9,208,356 Semiconductor device including encryption section, semiconductor device including external interface, and...
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an...
US-9,208,349 Securing data gathering devices of a personal computing device while performing sensitive data gathering...
A functional library can secure data gathering devices of a personal computing device on behalf of a secure application program to provide a more secure...
US-9,208,340 Parallel data processing system based on location control and method thereof
A parallel data processing system based on location control and a method thereof can divide a data into smaller data and store and manage the divided data using...
US-9,208,335 Space-time separated and jointly evolving relationship-based network access and data protection system
A network security system that employs space-time separated and jointly-evolving relationships to provide fast network access control, efficient real-time...
US-9,208,333 Secure data recorder
A method and apparatus for securely encrypting data is disclosed. Conventional protections against the loss or theft of sensitive data such as full disk...
US-9,208,330 System for execution of security related functions
An apparatus having a first memory circuit, a plurality of arithmetic modules, and a plurality of second memory circuits. The first memory circuit may be...
US-9,208,326 Managing and predicting privacy preferences based on automated detection of physical reaction
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive...
US-9,208,325 Protecting data on a mobile device
A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a "data...
US-9,208,319 Code base partitioning system
The subject disclosure is directed towards partitioning a code base of a program into a trusted portion and an untrusted portion. After identifying sensitive...
US-9,208,310 System and method for securely managing enterprise related applications and data on portable communication devices
A system and computer-implemented method for securely managing enterprise related applications and associated data on one or more portable communication devices...
US-9,208,309 Dynamically scanning a web application through use of web traffic information
Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application...
US-9,208,295 Policy-based control layer in a communication fabric
Presented herein are techniques for adding a secure control layer to a distributed communication fabric that supports publish-subscribe (pub-sub) and direct...
US-9,208,284 Medical professional application integration into electronic health record system
Embodiments relate to integrating data collection and productivity applications with an EHR system. To integrate a patient's data collection application with...
US-9,208,034 Determining security holes of a backup image
A system and method provide for backing up and restoring using patch level data for operating system and application files. Patch level data for the files in...
US-9,207,895 Image forming apparatus that stores data of print job in memory area, method of controlling image forming...
A image forming apparatus capable of performing reservation printing, even when incapable of storing print data in a memory unit due to an insufficient free...
US-9,207,772 Motion-based identity authentication of an individual with a communications device
Systems, methods and computer storage mediums securely authenticate an identity of an individual based on a pattern that is traced by the individual....
US-9,207,174 Apparatus and method for characterizing a replica tape
An apparatus and method are provided for characterizing a replica tape which has been embossed, compressed or cast on a surface of a material to be measured to...
US-9,207,044 Sight adapter for handheld mortar system
A sight adapter for a handheld mortar that is secured directly to the mortar tube and provides a standardized mounting system for a weapon sight. The sight...
US-9,205,024 Intravenous medication delivery safety assembly
An intravenous medication delivery safety assembly insures proper medication is delivered to a patient. The assembly includes an IV bag holding a medication. A...
US-9,204,305 Method for transmitting data in a sensor network, sensor node and central processor
A method for transmitting data in a sensor network, which comprises at least one sensor node and a central processor, is provided. The at least one sensor node...
US-9,203,980 Unit using operating system and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitoring memory (CRUM) unit used in an image forming job includes a central processing unit (CPU) with an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.