Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,161,711 System and method for detecting an epileptic seizure in a prone epileptic person
A system for detecting an epileptic seizure in a prone person, comprising: at least one motion sensor with at least one measurement axis having fastening...
US-9,161,291 Multi-tier wireless home mesh network with a secure network discovery protocol
An apparatus and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh...
US-9,161,228 Apparatus and method for generating a sequence of encryption keys for communication security in mobile wireless...
A random wave envelope is created from a set of bounded random numbers by additively combining a triangle, a square and a sine wave. The random wave envelope is...
US-9,161,218 System and method for provisioning over the air of confidential information on mobile communicative devices...
A method for over-the-air (OTA) provisioning a non-Universal Integrated Circuit Card (UICC) type secure element (SE) of a mobile device, including receiving a...
US-9,161,216 Traffic encryption key management for machine to machine multicast group
A method for decrypting multicast data by a mobile station in a wireless communication system is described. The method includes receiving an identifier of a...
US-9,161,214 Wireless communication method and system for transmission authentication at the physical layer
The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a...
US-9,160,988 System and method for payload encoding and decoding
Systems, methods and apparatuses are disclosed for protecting encoded media data. A minimum set of information needed to encode a single message for an encoded...
US-9,160,830 Mobile communication apparatus having anti-theft and auto-notification functions
A mobile communication apparatus comprises a first SIM card, an anti-theft control circuit, a transmission control circuit, and a security module. The first SIM...
US-9,160,768 Systems and methods for managing application security profiles
Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is...
US-9,160,765 Method for securing endpoints from onslaught of network attacks
A method for protecting endpoints from network attacks is provided. The method includes blocking a first data unit, in response to matching a portion of the...
US-9,160,764 Systems and methods for dynamic protection from electronic attacks
Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and...
US-9,160,757 Systems and methods for detecting suspicious attempts to access data based on organizational relationships
A computer-implemented method for detecting suspicious attempts to access data based on organizational relationships may include (1) detecting an attempt by a...
US-9,160,739 Secure data transmission system
A secure messaging system that requires pairing of second and receiving devices via user identification credentials and the associated media access control...
US-9,160,735 System for and method of securing a network utilizing credentials
A system for and method of securing a network are described herein. A receiving device listens for packets with proper credentials. If a transmitting device...
US-9,160,536 Verification of authenticity and responsiveness of biometric evidence and/or other evidence
Authenticity and responsiveness of evidence (e.g., biometric evidence) may be validated without regard for whether there is direct control over a sensor that...
US-9,160,420 System and method of wireless communication between devices and a communications network
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
US-9,160,419 System-on-chip having near field communication and other wireless communication
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
US-9,160,418 Near field communication method and apparatus thereof
A method for facilitating a secured data transmission in near field communication is provided. The method includes dynamically interleaving data to be...
US-9,159,059 Method of operating a terminal
A method of operating a terminal at an airport beyond security screening, the terminal having a housing, a display, a reader configured to read data from an...
US-9,159,009 Image forming apparatus and image output apparatus
The invented image forming apparatus includes an image data production condition production section for producing an image data production condition, an image...
US-9,158,942 Securing display output data against malicious software attacks
Systems, apparatus and methods are described including operations for securing display output data against malicious software attacks.
US-9,158,941 Managing access to content in a data processing apparatus
A data processing apparatus and method are provided for managing access to content within the data processing apparatus. The data processing apparatus has a...
US-9,158,938 Secure data entry based on a request in an electronic document
In some embodiments, techniques for secure data entry comprise receiving a request for secure data entry in an electronic document, presenting a data field in a...
US-9,158,936 Method of and apparatus for storing data
An electronic device for storing data content by storing at least a portion of the data content in a rewritable memory device by storing an n bit count value...
US-9,158,927 Cross-region recovery of encrypted, erasure-encoded data
Reliable and efficient storage and reconstruction of secure data files is provided. Encrypted fragments are generated by exclusive-OR (XOR) based ...
US-9,158,921 Secure boot on deep sleep wake-up
A processing system has a stored, encrypted data structure that is decrypted to provide verification data values. System data values are retrieved from...
US-9,158,920 System and method for out-of-band assisted biometric secure boot
In some embodiments, the invention involves using a dedicated service processor with out-of-band capabilities to enable a secure boot using biometric data to...
US-9,158,908 Power source for in-transit electronic media
Exemplary methods, systems and components are implemented on a multipassenger transit vehicle to provide passenger access to a pre-assigned interactive...
US-9,158,906 Authenticating a device and a user
A method of authenticating a device and a user comprises receiving a user input, generating a first key from the user input, performing a physical measurement...
US-9,158,896 Method and system for generating a secure key
A method, system on a chip, and computer system for generating more robust keys which utilize data occupying relatively small die areas is disclosed....
US-9,158,893 System for finding code in a data flow
A code finder system deployed as a software module, a web service or as part of a larger security system, identifies and processes well-formed code sequences....
US-9,158,829 System and method of data security in synchronizing data with a wireless device
A system is disclosed. The system includes a server, a client application, and a first database. The first database is associated with the client application....
US-9,158,361 Methods and systems for improving security in zero-power devices
Methods and systems for providing lime information in intermittently powered devices that are batteryless and operate purely on harvested energy (also referred...
US-9,158,029 Multi-stage security screening system and smart communication system
A multi-stage screening system for screening a container includes a pre-screening stage including a transmission X-ray device. The pre-screening stage is...
US-9,155,170 Conductive magnetic coupling system
Technologies are described herein for a conductive magnetic coupling system. The system includes a signal supply component that provides electrical and/or data...
US-9,155,071 Employing a home base station in a wireless communication environment
Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec...
US-9,154,958 Security system for cloud computing
Security system for cloud computing that will improve the security of users' authentications to cloud data and resources. User authentication to cloud resources...
US-9,154,942 Zero configuration communication between a browser and a networked media device
A method, apparatus and system related to zero configuration communication between a browser and a networked media device are disclosed. In one embodiment, a...
US-9,154,931 Synoptic emergency cellular device and system
A wearable emergency cellular device for use in a medical emergency alert situation includes an application containing synoptic medical information and other...
US-9,154,913 Disabling operation of features on a mobile communication device based upon location
Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical...
US-9,154,890 Wireless data transmission with predictive transmission adjustment
The present disclosure provides a method wherein preceding and succeeding data elements of a data element to be sent next are analyzed in order to set a signal...
US-9,154,815 Method and system for securing multimedia data streamed over a network
There is provided a method of securing multimedia data for streaming over a network comprising receiving the multimedia data from a server, transforming the...
US-9,154,573 Information exchange apparatus, method and managing system applied thereto
An information exchange apparatus has a processing unit, a wireless communication unit, a storage unit, a mainframe connection port and an identification...
US-9,154,515 Systems and methods identifying and reacting to potentially malicious activity
Information security may include defending information from unauthorized access, use, disclosure, modification, destruction, and so forth. Described herein are...
US-9,154,509 Intelligent electric device and network system including the device
A protection relay installed at a power system and a network system including the protection relay are disclosed, the protection relay storing a security level...
US-9,154,506 System and method for secure data generation and transmission
Systems and methods for secure generation and transmission of data over a communication network are described herein. In one example, the method comprises...
US-9,154,495 Secure data entry
In some embodiments, techniques for secure data entry comprise receiving request data, requesting secure data entry via a programmatic interface, and receiving...
US-9,154,488 Secured access to resources using a proxy
A method of authentication and accessing resources is provided. A client device may send a request to a proxy device to access a resource, such as an enterprise...
US-9,154,479 Secure proxy
Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy...
US-9,154,475 User authentication and authorization in distributed security system
Methods, systems, and apparatus, including computer program products, for distributed security system authorization. Client device authentication instructions...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.