Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,294,914 Localized visible light communications among wireless communication devices
A method and apparatus for monitoring a localized region of a touch screen for a plurality of sensor inputs to identify a camera profile of at least one user...
US-9,294,913 Android-based secure handheld network access device and micro-USB version of IEEE 802.15.4 bridge for ACSD networks
This disclosure focuses on the development of a micro-usb module that allows a smart-device to transmit and receive IEEE 802.25.4 messages via a connection...
US-9,294,901 Synoptic emergency cellular device and system
A wearable emergency cellular device for use in a medical emergency alert situation includes an application containing synoptic medical information and other...
US-9,294,788 Method, cryptographic system and security module for descrambling content packets of a digital transport stream
A method and cryptographic system for descrambling content packets, included within a digital transport stream, having conditional access messages and header...
US-9,294,610 Emergency alert system and program for portable devices
A system and software application that communicates with a central service for alerting a security service that help is needed, wherein an application running...
US-9,294,575 Transmitting appliance-specific content to a user device
Methods and systems are presented for transmitting appliance-specific content to a user device associated with an appliance. In some embodiments, a third party...
US-9,294,511 Sending out-of-band notifications
Out-of-band notifications are used to inform users of clients of security policy enforcement actions, such as enforcement of a data loss prevention (DLP)...
US-9,294,507 Techniques for data security in a multi-tenant environment
The usage of data in a multi-tenant environment can be controlled by utilizing functionality at the hypervisor level of various resources in the environment....
US-9,294,500 System and method for creating and applying categorization-based policy to secure a mobile communications...
A server creates categorization-based application policies and selects a specific policy to send to a mobile communications device. In one embodiment, the...
US-9,294,498 Online portal for improving cybersecurity risk scores
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity....
US-9,294,494 Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
US-9,294,472 Apparatus and method for managing health data
An apparatus and method for managing health data through a user terminal are provided. The method includes inputting a user terminal number for identifying the...
US-9,294,469 Systems and methods for establishing a connection between an appliance and a home energy management device
The present disclosure provides systems and methods for establishing a connection between an appliance and a home energy management device. Upon being prompted...
US-9,294,463 Apparatus, method and system for context-aware security control in cloud environment
An apparatus, method and system for context-aware security control in a cloud environment are provided. The apparatus includes an authentication header...
US-9,294,449 Low latency active noise cancellation system with client intercommunication
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content...
US-9,294,448 Cryptographic security functions based on anticipated changes in dynamic minutiae
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
US-9,294,445 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,294,444 Systems and methods for cryptographically splitting and storing data
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,294,443 Secure integration of hybrid clouds with enterprise networks
A system and method of managing secure integration of a cloud-based computing resource with a private domain are disclosed. One system includes a hybrid cloud...
US-9,294,440 Secure inter-zone data communication
A proxy receives a message from a computing system in a trusted secure zone directed to a computing system outside the trusted secure zone. The proxy determines...
US-9,294,438 Cloud computing method and system
Methods and systems integrating sensitive or private data with cloud computing resources while mitigating security, privacy and confidentiality risks associated...
US-9,294,402 Router, method for controlling router, and program
A router includes an input section configured to receive data, a buffer section including a plurality of data storage sections and configured to store the data...
US-9,294,288 Facilitating secure online transactions
A method and system for mutually authenticating an identity and a server is provided in accordance with an aspect of the present invention. The method commences...
US-9,294,283 Methods and devices for monitoring the integrity of an article during transporting said article
The method for obtaining information relating to the integrity of an article (2) as assessed from an exposure of said article (2) to physical or environmental...
US-9,294,277 Audio encryption systems and methods
Encryption systems and methods for audio data, and more particularly, for complete audio encryption of recorded data for transmission, management, review, and...
US-9,294,268 System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a...
US-9,293,169 Seal-type label to contain pressurized gas environment
In some embodiments, a data storage device has a housing with a cover and a base to define an interior environment. Fasteners extend through the housing to...
US-9,292,987 System and method for fully encrypted remote web-based voting
The presented invention discloses an electronic web-based election system and method for fully encrypted secure remote voting, wherein the voting data is fully...
US-9,292,986 Secured storage container
A secured storage container for transporting storage devices from a data center to a destruction center for degaussing or other destruction techniques. The...
US-9,292,805 Human security and survival system
The invention relates to a method and system of filling and maintaining a database containing geo-localized user data comprising the following steps:...
US-9,292,705 Management of drone operations and security in a pervasive computing environment
A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use...
US-9,292,702 Dynamic switching of security configurations
Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first...
US-9,292,700 Method and system for securing data
A method for securing user data includes the steps of: a) setting the user data as input data; b) randomly fragmenting the input data into a plurality of Atoms...
US-9,292,697 Matrix code for encryption, storage, and transmission of data
A computing device utilizes matrix codes to securely communicate information with a variety of servers. The computing device receives public user data, and...
US-9,292,693 Remediation of security vulnerabilities in computer software
Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each...
US-9,292,673 Virtual key management and isolation of data deployments in multi-tenant environments
Tenants in a multi-tenant shared deployment are provided their own distinct key spaces over which they control a key management system. In this manner, virtual...
US-9,292,619 Method and system for detecting movement of a signed element in a structured document
A sending entity creates a structured document and communicates it to a receiving entity includes a transform to ensure document elements are not moved during...
US-9,290,966 System for providing power and data transmission between a door and a frame
A system for providing wire-free and contact free electric power and communication connection in a security installation between a door and a frame. The cores,...
US-9,288,676 Trusted sensor data unaffected when an application processor operates in an unlocked state
Arrangements described herein relate to controlling RF communications by a communication device. Raw sensor data from one or more sensors can be received by a...
US-9,288,556 Method and apparatus for measuring body balance of wearable device
A wearable device includes a communication unit that wirelessly communicates with a first external device; a motion sensor that senses the user's motion; and a...
US-9,288,272 System and method for secure real-time cloud services
A system and method for providing secure, end-to-end data service enabling real-time data over the Internet is disclosed. The system and method provides a...
US-9,288,239 Method for recoverable message exchange independent of network protocols
A method is described to allow a device to retrieve a message, that is separated into a plurality of fragments, from a data source, wherein the method involves:...
US-9,288,229 Device association via video handshake
A method of pairing a first device with a second device is disclosed. Accordingly, an image that include encoded data is generated by the first device. The...
US-9,288,214 Authentication and authorization methods for cloud computing platform security
An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information...
US-9,288,207 Secure communications smartphone system
Methods, systems, and non-transitory data storage media are provided for secured communications where biometrics are used to secure communications sent over a...
US-9,288,199 Network access control with compliance policy check
Embodiments of the present invention involve a method and system including a network access control server, an authentication application running on a...
US-9,288,192 System and method for securing data from a remote input device
An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless...
US-9,288,176 Positionparameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the...
US-9,288,155 Computer system and virtual computer management method
A computer system, comprising: a virtual computer system and a verification system, the virtual computer system including: a deployment request reception part...
US-9,288,073 Communication system and transmission unit employed in same
Transmission and reception of data can be performed between first terminal communicating by transmission signal and second terminal communicating by...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.