Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,384,333 Method and system for secure distribution of selected content to be protected on an appliance-specific basis...
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related...
US-9,384,210 Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
US-9,384,150 Method and apparatus for performing transparent mass storage backups and snapshots
The present invention relates to providing security functionality over computer system mass storage data, and more particularly relates to a system and method...
US-9,384,149 Block-level data storage security system
A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. The secure storage appliance is configured...
US-9,384,065 Memory array with atomic test and set
A system and method of managing the storage of data is described where a plurality of requesting entities can be permitted access to a shared data resource....
US-9,381,297 Sealed infusion device with electrical connector port
A portable medical device includes an interface for accepting a power supply and enabling data transfer while still connected to a human body. The interface may...
US-9,380,431 Use of teams in a mobile application
A mobile data analysis system is provided that enables mobile device location tracking, secure messaging, and real-time sharing of intelligence information,...
US-9,380,430 Method and system for wireless communication with machine-to-machine devices
Approaches for managing machine-to-machine (M2M) wireless devices are disclosed. M2M devices may be managed using broadcast messages wirelessly transmitted from...
US-9,380,416 Portable computing device with data encryption and destruction
A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and...
US-9,380,415 Portable computing device with data encryption and destruction
A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and...
US-9,380,059 Systems and methods for configuring an electronic device
A method for configuring a device is performed at a target device with a processor and memory storing instructions for execution by the processor. In some...
US-9,380,040 Method for downloading preauthorized applications to desktop computer using secure connection
A method and computer program product for establishing a connection and downloading server applications on a desktop. A user downloads and installs custom...
US-9,380,029 Security-focused monitoring system
In some implementations, data from security monitoring devices of a facility is collected and analyzed within the facility and the results of the analysis is...
US-9,380,028 Proxy server operation
Data messages having secure data location addresses other than a predefined set are handled by a user terminal (14) in the normal way by setting up a secure...
US-9,380,024 Method and apparatus for providing security to devices
Systems, methods, and apparatus are provided for generating verification data that may be used for validation of a wireless transmit-receive unit (WTRU). The...
US-9,380,023 Enterprise cross-domain solution having configurable data filters
A cross-domain system for transferring files from a client to a server. A first server in the first network domain receives and stores files from the client via...
US-9,379,895 HTTP authentication and authorization management
Systems, methods and apparatus for a distributed security that provides authentication and authorization management. The system can include a source processor...
US-9,379,892 Trusted manager bridge
A system and method for securing processing devices includes a police bridge disposed in one or more data busses between a central processing and input/output...
US-9,379,504 Track having a backing plate with a plurality of slots and electrical contacts adjacent to each other
A modular equipment mount to enable quick relocation of the piece of equipment. The piece of equipment is secured to a mount. A track system is secured to...
US-9,379,140 Array substrate for liquid crystal display devices and method of manufacturing the same
An array substrate for LCD devices and a method of manufacturing the same are provided. By using a structure where an empty space is secured in a data line area...
US-9,378,784 Security device using high latency memory to implement high update rate statistics for large number of events
A security device includes a controller configured to determine a flow identifier and an event counter associated with a received data packet and a counter...
US-9,378,633 System to provide a security technology and management portal
A system to facilitate management of surveillance devices, that are distributed over a monitored region, through a geographic information (GI) portal, having GI...
US-9,378,616 Device security in a gaming machine
A gaming system employs a device security firewall having a plurality of rules and an inclusion list of a plurality of devices allowed to operate on a gaming...
US-9,378,518 Electronic signature security system
One embodiment of the invention enhances the security of electronic signatures during transmission. A peripheral device, which may be located remotely and...
US-9,378,498 Method for loading double e-wallets
The invention discloses a method for loading double e-wallets, relating to the information security field. The method includes steps of entering into a...
US-9,378,496 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-9,378,495 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-9,378,392 Methods and systems for controlling access to custom objects in a database
In embodiments, methods and systems for controlling access to custom objects are provided. These techniques for controlling access to custom objects can enable...
US-9,378,391 Method and apparatus for creating switchable desktops with separate authorizations
A system and method for creating switchable desktops each with its own authorization. The system provides a custom authentication and authorization data store...
US-9,378,387 Multi-level security cluster
Some embodiments may include multiple computers comprising a multi-level security system. The security system includes a first set of zones and a second set of...
US-9,378,385 Systems and methods for determining whether transmission of sensitive data is expected
The disclosed computer-implemented method for determining whether transmission of sensitive data is expected may include (1) identifying a computer program that...
US-9,378,384 Secure endpoint file export in a business environment
Embodiments for preventing data loss in a business environment are provided. In some embodiments, a secure endpoint file export application assigns users to...
US-9,378,383 Location based disk drive access
Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a...
US-9,378,378 Stateful data geofencing
An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of...
US-9,378,359 Gateway for controlling mobile device access to enterprise resources
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,378,344 Method and apparatus for protecting information based on data card
The present invention discloses a method and apparatus for protecting information based on a data card, and the method comprises: selecting information which...
US-9,378,339 System, method, and device for delivering communications and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
US-9,378,252 Custom web services data link layer
A data interface efficiently transports, manages, and provides data transfer. The data transfer may happen between a data storage layer and a presentation...
US-9,378,221 Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
US-9,378,220 Bonding contents on separate storage media
Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem...
US-9,377,626 Remote control augmented motion data capture
A head mounted display system for use with a mobile computing device, comprises a soft main body made entirely of a soft and compressible material, the main...
US-9,374,756 Secure wireless device handoff
Examples disclosed herein provide systems, methods, and software for rolling over a data communication from one communication network to another. In one...
US-9,374,685 Offline content distribution networks
Approaches, techniques, and mechanisms are disclosed for the secure distribution of media content to devices having minimal or no Internet connectivity....
US-9,374,422 Secure distributed data storage
A method of securely distributing and storing content may include receiving user content and identifying a number of storage servers that are configured to...
US-9,374,389 Method and system for ensuring an application conforms with security and regulatory controls prior to deployment
Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an...
US-9,374,385 Remediating computer security threats using distributed sensor computers
A data processing system comprises a security control computer performing operations comprising: receiving, an advertising exchange network computer,...
US-9,374,381 System and method for real-time malware detection based on web browser plugin
According to a method and system for real-time malware detection based on web browser plugin, the method and system may connect a web server of a web site...
US-9,374,374 Systems and methods for securing social media for users and businesses and rewarding for enhancing security
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed "social media." Recent trends have...
US-9,374,364 Method and system for implementing video two factor authentication
A method for authentication includes receiving a log-in request at a first client computer, and capturing user information with the request. The method includes...
US-9,374,346 Agile network protocol for secure communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service, and at least one processor configured to execute...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.