Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,147,074 Method and apparatus for securing CPUS booted using attached flash memory devices
The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more...
US-9,147,067 Security method and apparatus
In accordance with an example embodiment of the present invention, there is provided a method comprising: maintaining a local database of trusted uniform...
US-9,147,062 Renewal of user identification information
A method, data processing system, and computer program product for managing user identification information. A determination is made whether an instance of...
US-9,147,050 System and method for clipboard security
Provided is a clipboard security system and method for improving security of data transmission made through a clipboard which is frequently used in utilization...
US-9,146,949 Data structures and state tracking for network protocol processing
Described are data structures and methodology for forming same, for network protocol processing. A method for creating data structures for firewalling and...
US-9,146,883 Securing the contents of a memory device
A memory device may be equipped with quick erase capability to secure the contents of the memory device. The quick erase capability may effectively permanently...
US-9,146,882 Securing the contents of a memory device
A memory device may be equipped with quick erase capability to secure the contents of the memory device. The quick erase capability may effectively permanently...
US-9,146,692 Wireless internet access module, communication method for host and wireless internet access module, and data card
A communication method for a host and a wireless Internet access module, and a data card, are provided so that the host implements wireless Internet access with...
US-9,144,737 Securing goal-activated game content
Systems, methods, and data structures are described which allow limiting of dissemination of content in a multiplayer game, for example, limiting dissemination...
US-9,144,172 Modular data center and associated methods
A number of structural modules are configured to be secured together and to be secured to a foundation. Each of the structural modules is without one or more...
US-9,143,944 Secure peer-to-peer network setup
Apparatuses for peer-to-peer network setup are presented. In one embodiment, an apparatus comprises a wireless processing unit to communicate with a master...
US-9,143,941 Secure communication by user selectable communication range
An infusion system to administer fluid is disclosed. The infusion system to administer fluid includes an infusion pump having a pump processor, a pump memory...
US-9,143,934 System and method for remote control of a mobile device
A system and method are disclosed for remotely controlling a mobile device, useful particularly when a mobile device is displaced or physically dispossessed...
US-9,143,930 Secure element for mobile network services
In a secure element (4) that comprises an application (17B) and/or a security domain (17A) a mode is proved, in which mode a transfer of data (AD) to said...
US-9,143,923 System and method for remote control of a mobile device
A system and method are disclosed for remotely controlling a mobile device, useful particularly when a mobile device is displaced or physically dispossessed...
US-9,143,888 Method for the authentication of applications
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a...
US-9,143,743 Resilient remote surveillance system and method
A method, system, and medium are provided for remotely monitoring a surveillance area, including deploying a ruggedized, secure enclosure that includes a...
US-9,143,741 Internet protocol security camera connected light bulb/system
The present invention concerns an apparatus comprising an antenna module and a control module. The antenna module may be configured to connect and send data to...
US-9,143,546 System and method for data feed acceleration and encryption
Systems and methods for providing accelerated transmission of broadcast data, such as financial data and news feeds, over a communication channel using data...
US-9,143,530 Secure container for protecting enterprise data on a mobile device
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,143,529 Modifying pre-existing mobile applications to implement enterprise security policies
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,143,520 Method and apparatus for computer network security
Techniques are provided for computer network security. The techniques include obtaining operational data for at least a first networked application; obtaining...
US-9,143,510 Secure identification of intranet network
A method is provided for network identification based on high entropy data on a network which are not easily guessed or obtained outside the network, which can...
US-9,143,505 Image collection based information security method and system
An image collection based information security method and system is disclosed. The method includes a server side receiving a first transaction data sent by a...
US-9,143,504 Secure communication infrastructure
Described are techniques for using a first secure communication connection between a first component and a second component to establish a second communication...
US-9,143,500 Cloud data storage access verification method utilizing a variable assigning request string generator and...
A novel method of providing verifications for access to stored data programs within a cloud server protocol is provided. Such a method is operated through the...
US-9,143,497 Systems and methods for securing email in mobile devices
A computer-implemented method for providing secure mobile email communications is described. At least one application programming interface (API) of a native...
US-9,143,491 Quorum-based virtual machine security
Technologies related to quorum-based Virtual Machine (VM) security are generally described. In some examples, VM data, such as a VM payload or other VM data,...
US-9,143,488 Real-time encryption of voice and fax over IP
A method for encrypting application layer packets, including UDPTL data used by T.38 FOIP devices, for securing transmission of Fax communications over the...
US-9,143,487 System and method for massive controlled and secured update of devices firmware
System for remote firmware updates of mail processing device from a remote data server including: file download servers connected to the remote data server for...
US-9,143,383 Method and system for managing device identification
The present disclosure provides a method and a system for managing the identification of devices (DID). A network device may provide the network device...
US-9,143,330 Efficient and secure data currentness systems
Indicating data currentness includes, on any date of a sequence of dates, issuing a proof indicating the currentness status of the data during a particular time...
US-9,143,327 Power line communication (PLC) network nodes using cipher then segment security
Embodiments of the invention provide systems and methods for a cipher then segment approach in a Power Line Communication (PLC). A node or device generates...
US-9,143,324 Secure messaging
Given the rise in popularity of communicating personal, private, sensitive, or vital peer-to-peer or peer-to-group information over insecure text messaging...
US-9,143,317 Protecting against white box attacks using column rotation
Various embodiments of a computer-implemented method of information security using block cipher column rotations are described. The cipher state column...
US-9,142,260 Universal disk shipper
Systems, methods, and components include an improved universal disk container for use in transporting, storing and processing data storage disks or other...
US-9,142,108 Security apparatus and method
A security method and apparatus is disclosed. In one embodiment, a security method comprises storing one or more data points representing an alarm condition in...
US-9,141,992 Data feed acceleration
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
US-9,141,955 Biometrically secured user input for forms
Systems and methods for collecting biometrically secured financial form data from a user are described. A user input device may receive biometric data from the...
US-9,141,953 Personal token read system and method
A system for facilitating secure transactions between a purchaser and a vendor is provided. The system might include a purchaser token data capture device for...
US-9,141,949 Point of sale transaction device
A point of sale transaction device facilitates secure point of sale transactions. The device includes a housing. A processor and display are each coupled to the...
US-9,141,945 Secure distributed single action payment system
Methods and systems for enabling and performing secured, single action payments from a mobile device are disclosed. One method includes receiving user...
US-9,141,900 Progressive barcode
A method and apparatus for encoding, in a simultaneous multiple security application, independently encrypted security data elements within a single matrix of...
US-9,141,831 Scheduler, security context cache, packet processor, and authentication, encryption modules
An electronic circuit (200) includes one or more programmable control-plane engines (410, 460) operable to process packet header information and form at least...
US-9,141,829 Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated...
US-9,141,821 Selective encryption of data stored on removable media in an automated data storage library
In an automated data storage library, selective encryption for data stored or to be stored on removable media is provided. One or more encryption policies are...
US-9,141,815 System and method for intelligence based security
Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user...
US-9,141,810 Architecture for virtual security module
A device supports the processing of multiple active applications in a processor through a mapping system that securely identifies and differentiates commands...
US-9,141,804 Processor boot security device and methods thereof
A method of securing network authentication information at a data processing device includes determining a boot source from which to boot the device and...
US-9,141,793 Method for securing a microprocessor, corresponding computer program and device
A method is provided for securing a microprocessor containing at least one main program, which operates with at least one memory. The method includes...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.