Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,561,731 Structural bollard assembly for electric vehicle infrastructure
The invention disclosed herein is directed to electric vehicle ("EV") infrastructure, which includes a customizable charging station that comprises a modular...
US-9,560,693 Methods and apparatus for access data recovery from a malfunctioning device
Methods and apparatus for recovering access data from a malfunctioning device. In one embodiment, trained service personnel are provided a specialized apparatus...
US-9,560,523 Mobile device authentication
One aspect of the invention is a system for mobile device authentication. The system includes a public-facing server configured to interface with a mobile...
US-9,560,122 Secure native application messaging with a browser application
A system for securely mediating messages between a native application and a browser application on a computing device includes running the browser application...
US-9,560,078 Technologies for scalable security architecture of virtualized networks
Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security...
US-9,560,072 Discovering and selecting candidates for sinkholing of network domains
Techniques for discovering and selecting candidates for sinkholing of network domains are provided. In some embodiments, a process for discovering and selecting...
US-9,560,070 Distribution of security rules among sensor computers
Systems and methods for generating rules in a networking environment having one or more sensor computers logically connected to compromised computers are...
US-9,560,068 Network intrusion detection with distributed correlation
A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects...
US-9,560,056 Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
US-9,560,040 Mitigating risk of account enumeration
Technology is disclosed for mitigating account enumeration and thus enhances network security. The technology can receive from a client computing device a...
US-9,560,031 Identity management via cloud
A system and method of maintaining a user profile for a handheld computer in a shared, scalable computing resource is described. The method includes receiving...
US-9,560,026 Secure computer operations
In some implementations, a computing device includes an identifier that is embedded into a firmware of the computing device. The identifier uniquely identifies...
US-9,560,025 Apparatus and method for secure delivery of data from a communication device
A system that incorporates the subject disclosure may perform, for example, providing an upload request to a mobile communication device to cause a secure...
US-9,560,020 Securing email conversations
At least a portion of a transmission of an outgoing first email from a first email account to at least a second email account is encrypted. Second email address...
US-9,560,019 Method and system for managing security in a computing environment
A method and system for managing data security in a computing environment. A processor at the gateway server receives, from a user device, at least one message....
US-9,560,012 Cross domain gateway having temporal separation
A computer network is disclosed that includes a first domain and a second domain. The second domain has a higher security classification than the first domain....
US-9,559,901 Systems and methods for remote device configuration
Systems and methods for remote device configuration is provided. In one embodiment, a method comprises outputting, from a computer, to a first computing device,...
US-9,559,852 Cryptographic security functions based on anticipated changes in dynamic minutiae
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of...
US-9,559,851 Secure pairing for secure communication across devices
Technologies for securely pairing a first computing device with a second computing device include the first computing device to generate a session message key...
US-9,559,837 Methods for cryptographic delegation and enforcement of dynamic access to stored data
Efficient methods for assigning, revoking, and realizing access to stored data involve a cryptographic key hierarchy and a set of operations performed on...
US-9,559,479 Angled connector for connecting two devices and having a fastening device
Embodiments of the present disclosure include an apparatus and a method for connecting a first device and second device. An apparatus includes an angled...
US-9,558,808 DRAM security erase
A memory includes a DRAM array having memory cells, wordlines and bitlines coupled to the memory cells, and sense amplifiers. The memory can be configured to...
US-9,558,523 Secure nonscheduled video visitation system
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated...
US-9,558,521 System and method for populating a field on a form including remote field level data capture
In general, in one aspect, the invention relates to a method for populating a field on a form. The method includes: establishing a communication session between...
US-9,558,374 Methods and systems for securing stored information
Methods and systems for securing information are provided. The method includes generating a hash key by an input/output (I/O) processing module interfacing with...
US-9,558,370 Cloud key directory for federating data exchanges
Embodiments are directed to providing attribute-based data access. In an embodiment, a data request specifies one or more search data attributes describing...
US-9,558,359 Information theoretically secure protocol for mobile proactive secret sharing with near-optimal resilience
Described, is system for mobile proactive secret sharing. The system initializes a RobustShare protocol to distribute a block of secret data among a set of...
US-9,558,357 Delegation of access rights to an account after the disappearance of the user
A management process for access to secure data includes: storing secure data associated with a first user and authentication data of said first user, managing...
US-9,558,356 Data driven system for responding to security vulnerability
A data-driven system for fast response to security vulnerability, in one example embodiment, comprises a request detector, a content type evaluator, and a...
US-9,558,346 Information processing systems with security-related feedback
An information processing system implements a security system. The security system comprises a classifier configured to process information characterizing...
US-9,558,342 Secured repair data package
An arrangement for storing a data set in an ECU in a vehicle control system, wherein the arrangement includes a computer connected to the vehicle, where the...
US-9,558,322 Secure computing systems and methods
The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other sensitive information. Certain embodiments may...
US-9,558,128 Selective management of security data
Security techniques may be selectively performed on data based on a classification of the data. One example technique includes receiving a memory access command...
US-9,557,944 Printing system including a host apparatus, and a printing apparatus which is connected to the host apparatus...
When performing authenticated printing, an administrator must minutely grasp the consistency between account registered information held by a printer and...
US-9,557,930 Security for memory module data
A memory module contains a set of contacts configured to contact a second set of contacts on a memory module connector when the memory module is removed from...
US-9,557,927 Data processing device and data processing method
Embodiments of the present invention provide a data processing device and a data processing method. In the data processing device and the data processing method...
US-9,557,802 Method of controlling SDIO device and related SDIO system and SDIO device
Described in embodiments herein are techniques for placing a secure digital input output (SDIO) device in a sleep mode and waking up the SDIO device from the...
US-9,557,436 3-dimensional model creation methods and apparatuses
Disclosed are methods and apparatuses for creating a 3-Dimensional model for objects in an inspected luggage in a CT system. The method includes acquiring slice...
US-9,556,564 Structure for railroad ties having data acquisition, processing and transmission means
A laminated wood and encapsulated railroad tie structure and its associated method of manufacture. A wood core of laminated wood slats is inserted into an...
US-9,555,772 Embedded security system for environment-controlled transportation containers and method for detecting a...
An embedded security system for an environment-controlled trailer including a transportation refrigeration unit. The security system includes a plurality of...
US-9,554,280 Method for managing data communication between a communication device and another device and communication device
A method for managing data communication between a communication device (102) and another device (112) in a communication network, comprises providing (500)...
US-9,554,279 Authorized areas of authentication
A secure access system, including a stationary computing device that controls access to secure data over a secure network, including an authorized area of...
US-9,553,895 System and method for building intelligent and distributed L2-L7 unified threat management infrastructure for...
A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically...
US-9,553,892 Selective modification of encrypted application layer data in a transparent security gateway
According to one embodiment, a transparent security gateway is coupled between a client end station (CES) and a web application server (WAS). The security...
US-9,553,888 Systems and methods for dynamic protection from electronic attacks
Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and...
US-9,553,871 Clock synchronized dynamic password security label validity real-time authentication system and method thereof
This invention discloses a clock synchronized dynamic password security label validity real-time authentication system and method thereof, which comprises, the...
US-9,553,867 Secure application access system
A proxy server receives a synchronization request from an application program resident on a user device. The proxy server determines that the user device...
US-9,553,854 Data security service
A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The...
US-9,553,852 Secure connection between a data repository and an intelligence application
Embodiments of the invention are directed to systems, methods and computer program products for establishing a secure connection between a data repository and...
US-9,553,850 Multi-tenant secure separation of data in a cloud-based application
Multi-tenant and single-tenant methodologies are blended into a single solution to provide cost savings of multi-tenancy along with data security and privacy of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.