Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,154,913 Disabling operation of features on a mobile communication device based upon location
Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical...
US-9,154,890 Wireless data transmission with predictive transmission adjustment
The present disclosure provides a method wherein preceding and succeeding data elements of a data element to be sent next are analyzed in order to set a signal...
US-9,154,815 Method and system for securing multimedia data streamed over a network
There is provided a method of securing multimedia data for streaming over a network comprising receiving the multimedia data from a server, transforming the...
US-9,154,573 Information exchange apparatus, method and managing system applied thereto
An information exchange apparatus has a processing unit, a wireless communication unit, a storage unit, a mainframe connection port and an identification...
US-9,154,515 Systems and methods identifying and reacting to potentially malicious activity
Information security may include defending information from unauthorized access, use, disclosure, modification, destruction, and so forth. Described herein are...
US-9,154,509 Intelligent electric device and network system including the device
A protection relay installed at a power system and a network system including the protection relay are disclosed, the protection relay storing a security level...
US-9,154,506 System and method for secure data generation and transmission
Systems and methods for secure generation and transmission of data over a communication network are described herein. In one example, the method comprises...
US-9,154,495 Secure data entry
In some embodiments, techniques for secure data entry comprise receiving request data, requesting secure data entry via a programmatic interface, and receiving...
US-9,154,488 Secured access to resources using a proxy
A method of authentication and accessing resources is provided. A client device may send a request to a proxy device to access a resource, such as an enterprise...
US-9,154,479 Secure proxy
Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy...
US-9,154,475 User authentication and authorization in distributed security system
Methods, systems, and apparatus, including computer program products, for distributed security system authorization. Client device authentication instructions...
US-9,154,474 Communication security method and apparatus of first node and second node communicating based on full duplex...
A communication security method and apparatus of a first node and a second node are provided. The first node and the second node communicate with each other...
US-9,154,432 Method and apparatus to control TX/RX AMSDU size based on the negotiated maximum transmission unit in the...
A method includes selecting upstream and downstream aggregated MAC service data unit (AMSDU) sizes for communications between a client device, an access point,...
US-9,154,310 Resilient device authentication system
A resilient device authentication system and method comprising: one or more verification authorities (VAs) including a memory loaded with a complete...
US-9,154,299 Remote management of endpoint computing device with full disk encryption
Methods and apparatus involve protecting data encrypted by a first key on an endpoint computing asset including a drive with full disk encryption. The endpoint...
US-9,154,298 Securely storing data in a dispersed storage network
A method to securely store a data file in a dispersed storage network (DSN) in a manner to increase difficulty in hacking the data file begins by a dispersed...
US-9,152,997 Method for buying and selling stocks and securities
A computer-based method and system for buying and selling stocks and other securities. In general, the method creates an indicator for the purchase point or...
US-9,152,966 Data reporting framework across on-premise and hosted CRM services
A data reporting framework that works across on-premise and hosted Customer Relationship Management (CRM) platforms enabling definition and execution of secure...
US-9,152,901 Method for the production of a book cover insert and book-type security document and book cover insert and...
The invention relates to a method for the production of a book cover insert (11) and to a method for the production of a book-type security document (30) and...
US-9,152,899 Secure, server-less print release
A print release environment includes a client computing device, an imaging device and an active directory. The client stores an imaging job on a local hard...
US-9,152,825 Using storage controller bus interfaces to secure data transfer between storage devices and hosts
The disclosed embodiments provide a system that secures data transfer between a storage device and a host. During operation, the system obtains an input/output...
US-9,152,822 Method and apparatus for securing programming data of a programmable device
Configuration data for a programmable integrated circuit device is at least partially encrypted according to at least one encryption scheme. A plurality of key...
US-9,152,815 Method, secure device, system and computer program product for securely managing user access to a file system
A method, a secure device, a system and a computer program product for securely managing user access to a file system. The method includes providing a secure...
US-9,152,805 Security device
A security device connected to a host device which includes a processor performing a scramble operation and a storage unit, the security device comprising: a...
US-9,152,799 System and method for allowing secure remote server access using data prevention code
Systems and methods are provided for providing users at remote access devices with conditional access to server-based applications. Requests for access to...
US-9,152,797 Device and method for secure memory access
In a secure computing environment, a method, system and device are provided for loading stored encryption key data from a protected non-volatile memory of a...
US-9,152,779 Protecting codes, keys and user credentials with identity and patterns
Machine and method of accessing information securely are disclosed. Two sets of user identifying data are acquired. A transformation is established by mapping...
US-9,152,776 Secure access-based enumeration of a junction or mount point on a clustered server
Embodiments described herein provide a technique for securely responding to an enumeration request of a data container stored at a location referenced by a...
US-9,152,606 Task switching and inter-task communications for multi-core processors
The invention provides hardware based techniques for switching processing tasks of software programs for execution on a multi-core processor. Invented...
US-9,152,579 Meta-complete data storage
The invention described herein generally relates to systems and methods of securely storing data so that the data contains information about the data and/or the...
US-9,152,578 Securing data replication, backup and mobility in cloud storage
A technique secures data in cloud storage. The technique involves receiving, by processing circuitry, an input/output (I/O) request which includes host data....
US-9,152,576 Mode-based secure microcontroller
Various embodiments of the present invention are related to integrated circuits for processing data at a microcontroller interface. The microcontroller...
US-9,152,571 All invalidate approach for memory management units
An input/output memory management unit (IOMMU) having an "invalidate all" command available to clear the contents of cache memory is presented. The cache memory...
US-9,152,505 Verified hardware-based erasure of data on distributed systems
Systems, methods and related processes for securely erasing and/or rendering permanently inaccessible data stored on storage systems securely erased is...
US-9,152,404 Remote device filter
Methods and devices for connecting a mobile device with different data storage devices located either locally or remotely are provided. The device may apply one...
US-9,152,177 Self-aligning connection to a docking station
A docking station (2) system for a tablet (1) having a data connector, said docking station (2) comprising: a substantially planar docking platform (4) for...
US-9,151,023 Systems and methods for controlling flushing apparatus and related interfaces
A programmable automated water flushing system (PAWFS) allows for two way communication and remote flushing unit management through a secure web access point or...
US-9,148,784 Secure wireless device handoff
Examples disclosed herein provide systems, methods, and software for rolling over a data communication from one communication network to another. In one...
US-9,148,783 Method of managing sensitive data in an electronic token
A method of managing data in an electronic token includes an initial step of storing a first data into the electronic token and into a secured site. Secret...
US-9,148,780 Method and apparatus for secure data transmission
A method and apparatus for secured data transmission is provided. The base station determines a first precoding matrix based on channel information of an...
US-9,148,700 Remotely defining security data for authorization of local application activity
Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing...
US-9,148,448 System and method for configuring devices for secure operations
Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data...
US-9,148,447 Safe services framework
Providing security-related services for enterprise service requests includes receiving a service request from an endpoint, determining the transaction parameter...
US-9,148,446 Selective modification of encrypted application layer data in a transparent security gateway
According to one embodiment, a transparent security gateway is coupled between a client end station (CES) and a web application server (WAS). The security...
US-9,148,443 Enhanced security and safety in telerobotic systems
Methods and systems for securing remotely-operable devices are provided. A security device can receive a plurality of commands to control a remotely-operable...
US-9,148,424 Systems and methods for IP-based intrusion detection
Systems and methods for account security are provided. In one example embodiment, a first login request including a username and a password is analyzed to...
US-9,148,417 Computerized method and system for managing amendment voting in a networked secure collaborative exchange...
In embodiments of the present invention improved capabilities are described for managing amendment voting in a networked secure collaborative computer data...
US-9,148,285 Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing...
Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who...
US-9,147,337 Method and system for logging security event data
Through the use of a persistent connection between security, monitoring and automation controller devices and provider supported servers in an operator domain,...
US-9,147,108 Method for checking an optical security feature of a value document
A method for checking a prescribed optical security feature on a prescribed portion of a value document based on pixel data of pixels of an image of the portion...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.