Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,144,737 Securing goal-activated game content
Systems, methods, and data structures are described which allow limiting of dissemination of content in a multiplayer game, for example, limiting dissemination...
US-9,144,172 Modular data center and associated methods
A number of structural modules are configured to be secured together and to be secured to a foundation. Each of the structural modules is without one or more...
US-9,143,944 Secure peer-to-peer network setup
Apparatuses for peer-to-peer network setup are presented. In one embodiment, an apparatus comprises a wireless processing unit to communicate with a master...
US-9,143,941 Secure communication by user selectable communication range
An infusion system to administer fluid is disclosed. The infusion system to administer fluid includes an infusion pump having a pump processor, a pump memory...
US-9,143,934 System and method for remote control of a mobile device
A system and method are disclosed for remotely controlling a mobile device, useful particularly when a mobile device is displaced or physically dispossessed...
US-9,143,930 Secure element for mobile network services
In a secure element (4) that comprises an application (17B) and/or a security domain (17A) a mode is proved, in which mode a transfer of data (AD) to said...
US-9,143,923 System and method for remote control of a mobile device
A system and method are disclosed for remotely controlling a mobile device, useful particularly when a mobile device is displaced or physically dispossessed...
US-9,143,888 Method for the authentication of applications
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a...
US-9,143,743 Resilient remote surveillance system and method
A method, system, and medium are provided for remotely monitoring a surveillance area, including deploying a ruggedized, secure enclosure that includes a...
US-9,143,741 Internet protocol security camera connected light bulb/system
The present invention concerns an apparatus comprising an antenna module and a control module. The antenna module may be configured to connect and send data to...
US-9,143,546 System and method for data feed acceleration and encryption
Systems and methods for providing accelerated transmission of broadcast data, such as financial data and news feeds, over a communication channel using data...
US-9,143,530 Secure container for protecting enterprise data on a mobile device
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,143,529 Modifying pre-existing mobile applications to implement enterprise security policies
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,143,520 Method and apparatus for computer network security
Techniques are provided for computer network security. The techniques include obtaining operational data for at least a first networked application; obtaining...
US-9,143,510 Secure identification of intranet network
A method is provided for network identification based on high entropy data on a network which are not easily guessed or obtained outside the network, which can...
US-9,143,505 Image collection based information security method and system
An image collection based information security method and system is disclosed. The method includes a server side receiving a first transaction data sent by a...
US-9,143,504 Secure communication infrastructure
Described are techniques for using a first secure communication connection between a first component and a second component to establish a second communication...
US-9,143,500 Cloud data storage access verification method utilizing a variable assigning request string generator and...
A novel method of providing verifications for access to stored data programs within a cloud server protocol is provided. Such a method is operated through the...
US-9,143,497 Systems and methods for securing email in mobile devices
A computer-implemented method for providing secure mobile email communications is described. At least one application programming interface (API) of a native...
US-9,143,491 Quorum-based virtual machine security
Technologies related to quorum-based Virtual Machine (VM) security are generally described. In some examples, VM data, such as a VM payload or other VM data,...
US-9,143,488 Real-time encryption of voice and fax over IP
A method for encrypting application layer packets, including UDPTL data used by T.38 FOIP devices, for securing transmission of Fax communications over the...
US-9,143,487 System and method for massive controlled and secured update of devices firmware
System for remote firmware updates of mail processing device from a remote data server including: file download servers connected to the remote data server for...
US-9,143,383 Method and system for managing device identification
The present disclosure provides a method and a system for managing the identification of devices (DID). A network device may provide the network device...
US-9,143,330 Efficient and secure data currentness systems
Indicating data currentness includes, on any date of a sequence of dates, issuing a proof indicating the currentness status of the data during a particular time...
US-9,143,327 Power line communication (PLC) network nodes using cipher then segment security
Embodiments of the invention provide systems and methods for a cipher then segment approach in a Power Line Communication (PLC). A node or device generates...
US-9,143,324 Secure messaging
Given the rise in popularity of communicating personal, private, sensitive, or vital peer-to-peer or peer-to-group information over insecure text messaging...
US-9,143,317 Protecting against white box attacks using column rotation
Various embodiments of a computer-implemented method of information security using block cipher column rotations are described. The cipher state column...
US-9,142,260 Universal disk shipper
Systems, methods, and components include an improved universal disk container for use in transporting, storing and processing data storage disks or other...
US-9,142,108 Security apparatus and method
A security method and apparatus is disclosed. In one embodiment, a security method comprises storing one or more data points representing an alarm condition in...
US-9,141,992 Data feed acceleration
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
US-9,141,955 Biometrically secured user input for forms
Systems and methods for collecting biometrically secured financial form data from a user are described. A user input device may receive biometric data from the...
US-9,141,953 Personal token read system and method
A system for facilitating secure transactions between a purchaser and a vendor is provided. The system might include a purchaser token data capture device for...
US-9,141,949 Point of sale transaction device
A point of sale transaction device facilitates secure point of sale transactions. The device includes a housing. A processor and display are each coupled to the...
US-9,141,945 Secure distributed single action payment system
Methods and systems for enabling and performing secured, single action payments from a mobile device are disclosed. One method includes receiving user...
US-9,141,900 Progressive barcode
A method and apparatus for encoding, in a simultaneous multiple security application, independently encrypted security data elements within a single matrix of...
US-9,141,831 Scheduler, security context cache, packet processor, and authentication, encryption modules
An electronic circuit (200) includes one or more programmable control-plane engines (410, 460) operable to process packet header information and form at least...
US-9,141,829 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-9,141,821 Selective encryption of data stored on removable media in an automated data storage library
In an automated data storage library, selective encryption for data stored or to be stored on removable media is provided. One or more encryption policies are...
US-9,141,815 System and method for intelligence based security
Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user...
US-9,141,810 Architecture for virtual security module
A device supports the processing of multiple active applications in a processor through a mapping system that securely identifies and differentiates commands...
US-9,141,804 Processor boot security device and methods thereof
A method of securing network authentication information at a data processing device includes determining a boot source from which to boot the device and...
US-9,141,793 Method for securing a microprocessor, corresponding computer program and device
A method is provided for securing a microprocessor containing at least one main program, which operates with at least one memory. The method includes...
US-9,141,787 Interlocked binary protection using whitebox cryptography
A system and method for transforming a software application comprising binary code and optionally associated data, from an original form to a more secure form....
US-9,141,658 Data classification and management for risk mitigation
An information management system is leveraged to mitigate risks associated with data objects in a computer system. The information management system collects...
US-9,141,558 Secure memory control parameters in table look aside buffer data fields and support memory array
Techniques and apparatus for utilizing bits in a translation look aside buffer (TLB) table to identify and access security parameters to be used in securely...
US-9,141,513 Maintaining a secure computing device in a test taking environment
The presently disclosed invention provides for the security of a computing device in the context of a test taking environment. By securing a computing device,...
US-9,141,434 Robust non-shareable resource access under live virtual machine cloning
A system and method are disclosed for preventing concurrent access by a virtual machine and a clone of the virtual machine to a resource in a non-shareable...
US-9,141,303 Method for selectively performing a secure data erase to ensure timely erasure
A method and computer program product are provided to ensure a timely secure data erase by determining an erasure deadline for each physical volume of a...
US-9,139,768 Variable data printing for security purposes using ceramic sub-micron infrared-luminescent particles in inkjet ink
Methods and apparatus for variable data printing for security purposes using ceramic sub-micron infrared-luminescent particles in inkjet ink. An example...
US-9,137,836 Inter-device communication authorization and data sniffing in wireless communication systems
Systems and methods for user equipment (UE) for inter-device communication authorization and data sniffing in wireless communication systems are provided. A UE...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.