Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,117,153 Data carrier having a contact plate with printing thereon
A data carrier having a main card body and a contact plate included on a surface of said main card body, wherein an area of the contact plate has a printed...
US-9,117,095 Data security for digital data storage
A computing system includes data encryption in the data path between a data source and data storage devices. The data encryption may utilize a key which is...
US-9,117,090 System and method for a secure data collection system
The system may provide for the collection of data in a heterogeneous network, long term secure storage of the data, and secure transfer of the data to an...
US-9,117,087 System and method for creating a secure channel for inter-application communication based on intents
System and method for creating a secure channel for inter-application communication based on the messaging system called Intents in the Android OS are...
US-9,117,084 Methods, systems, and computer readable media for measuring detection accuracy of a security device using...
Methods, systems, and computer readable media for measuring detection accuracy of a security device using benign traffic are disclosed. According to one method,...
US-9,117,083 Managing booting of secure devices with untrusted software
Normally, at the time of manufacturing, security may be provided to a device being manufactured through the loading of an operating system that has been...
US-9,117,069 Real-time vulnerability monitoring
A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system,...
US-9,116,888 Customer controlled data privacy protection in public cloud
Data to be submitted to a remote node is selectively protected. In various embodiments, an indication is received to protect a data value that is to be...
US-9,116,857 Secure archive
Storage apparatus (20) includes a memory (30) and an encryption processor (28), which is configured to receive and encrypt data transmitted from one or more...
US-9,116,844 Data processing apparatus and method for analysing transient faults occurring within storage elements of the...
A data processing apparatus has a plurality of storage elements residing at different physical locations within the apparatus, and fault history circuitry for...
US-9,116,841 Methods and systems for securely transferring embedded code and/or data designed for a device to a customer
The invention relates to methods and systems for securely transferring embedded code or data to a customer, in particular to methods and systems for securely...
US-9,116,840 Semiconductor device and data processing method
A semiconductor device has: as security states to which the nonvolatile memory device can transition, an unprotected state in which, when secret information is...
US-9,116,711 Exception handling in a data processing apparatus having a secure domain and a less secure domain
Processing circuitry can operate in a secure domain and a less secure domain. In response to an initial exception from background processing performed by the...
US-9,115,512 "Match" controlled container
A secure safety container is made up with a base and a cover that can be locked together by an electric operated lock carried by the container. The top and base...
US-9,114,721 Electric power information management apparatus, electric power information management system, and electric...
An electric power information management apparatus includes a power meter that measures electric power data on electric power to be supplied from a storage...
US-9,113,776 Systems and methods for secure portable patient monitoring
A patient monitoring system that enables a healthcare provide to request access to patient data via interaction directly with a local patient monitor and...
US-9,113,492 Method and apparatus for transmit priority determination within a link
A method, computer program product, and an apparatus for a transmit priority distributed backoff are provided. The apparatus forms a peer-to-peer communication...
US-9,113,282 Mobile core client architecture
Multiple types of applications, electronic forms, electronic forms data instances, network services and, network services are automatically managed by methods...
US-9,113,226 Methods and systems for re-securing a compromised channel in a satellite signal distribution environment
A method implemented by a set top box that encrypts communications for a channel stacking switch (CS) using a public key of the CSS, the method comprising:...
US-9,113,195 Real-time DVR programming
Techniques for real-time DVR programming employ secure instant message protocol in a DVR environment. An embodiment sends an instant message to the DVR which...
US-9,113,005 Image forming apparatus and image forming system for secure transmission of image data
An image transmission apparatus includes an original document reading unit, an operation unit, a receiving unit, and a control unit. The original document...
US-9,112,914 Web service provision system, server device, and method
A web application server includes a user information management unit that manages user IDs and attributes such that each of the user IDs is associated with...
US-9,112,911 Adding firewall security policy dynamically to support group VPN
A server device receives, from a member device, a registration request for a group virtual private network (VPN) and provides an initial firewall security...
US-9,112,894 Real time distributed network monitoring and security monitoring platform (RTD-NMS)
A platform to support real time passive distributed network monitoring and security monitoring applications wherein the platform will use the open architecture...
US-9,112,886 Method and system for providing centralized data field encryption, and distributed storage and retrieval
An approach is provided for securely storing sensitive data values. A primary facility is provided that directly or indirectly receives requests from a...
US-9,112,858 Methods and systems for capturing biometric data
A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an...
US-9,112,857 System and device for facilitating a wireless transaction by consolidating SIM, personal token, and associated...
The invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification. The device combines...
US-9,112,851 Integrating web protocols with applications and services
Techniques for integrating a security protocol in an application include receiving a web protocol request generated by the application at an interceptor, the...
US-9,112,846 Method and apparatus for transmitting additional authorization data via GSSAPI
A system and method for using a GSSAPI security token to transport additional non-GSSAPI data that includes authorization data used by third-party software. The...
US-9,112,842 Secure authentication and transaction system and method
A secure user authentication system, operable over a client-server communications network to authenticate a system user. The system includes an application...
US-9,112,836 Management of secure data in cloud-based network
A processor receives a request to access secure data. The processor translates the request in order to locate the secure data in a secure data store. The...
US-9,112,683 Maintaining triggered session state in secure user plane location (SUPL) enabled system
A method is provided for maintaining session state in a Secure User Plane Location (SUPL) enabled system during a triggered session. The method includes...
US-9,112,681 Method and apparatus for secure information transfer to support migration
A system and method are disclosed for providing and maintaining a high level of security during migration of data from one platform to another. The disclosed...
US-9,112,630 Clock synchronization in the presence of security threats
In a network device communicatively coupled to a master clock via a plurality of different communication paths, a clock synchronization module is configured to...
US-9,111,621 Solid state drive memory device comprising secure erase function
A memory device such as a solid state memory device have a dual-hardware, secure erase feature. A memory controller operating in a memory controller domain...
US-9,111,331 X-ray inspection system that integrates manifest data with imaging/detection processing
The present specification discloses systems and methods for integrating manifest data for cargo and light vehicles with their X-ray images generated during...
US-9,111,194 Contactless data transmission device, security and/or valuable document including the same and method for...
This present invention serves to simplify manufacture of a contactless data transmission device (50). This device (50) has an electrically insulating carrier...
US-9,111,193 System and method for providing contactless payment with a near field communications attachment
A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable...
US-9,111,122 Asymmetric cryptographic device with local private key generation and method therefor
An asymmetric cryptographic integrated circuit 20 and a data processing device 10 in which the integrated circuit 20 is used are disclosed. A security boundary...
US-9,111,120 Method for creating a secure dataset and method for evaluating the same
A method is provided for creating a secure dataset using a software application running on a data processing system, wherein the method comprises the following...
US-9,111,111 Location-based file security
Systems and methods for implementing location-based security protocols for information and/or data files are disclosed. The location-based security protocols...
US-9,111,103 Remote access control of storage devices
An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise...
US-9,111,102 Creation of security roles through user walkthrough of business process workflow
A user interface is displayed to an administrator (or other user) and allows the administrator to walk through a workflow performed by a user in a given role....
US-9,111,097 Secure execution architecture
The present invention relates to circuitry and a method for providing data security, which circuitry contains at least one processor and at least one storage...
US-9,111,088 Policy-based physical security system for restricting access to computer resources and data flow through...
Embodiments are directed to systems and methods for integration and normalization of physical security data, states and events to and from disparate physical...
US-9,111,077 Method and device for realizing remote login
The present disclosure provides a method and a device for realizing remote login. The method includes: a terminal server responding to a login request to an...
US-9,111,045 Intelligent controller system and method for smart card memory modules
A storage device contains a smart-card device and a memory device, both of which are accessed though a controller. The storage device may be used in the same...
US-9,110,816 Cache memory having enhanced performance and security features
Methods for accessing, storing and replacing data in a cache memory are provided, wherein a plurality of index bits and a plurality of tag bits at the cache...
US-9,110,700 Methods and systems for preventing access to display graphics generated by a trusted virtual machine
The methods and systems described herein provide for preventing a non-trusted virtual machine from reading the graphical output of a trusted virtual machine. A...
US-9,110,605 Wireless internet access module, communication method for host and wireless internet access module, and data card
A communication method for a host and a wireless Internet access module, and a data card, are provided so that the host implements wireless Internet access with...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.