Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,078,569 Configurable data measurement and acquisition systems for multi-slice X-ray computed tomography systems
A Data Measurement and Acquisition System (DMAS) for multi-slice X-ray CT systems and multi-slice X-ray CT systems using the DMAS are disclosed; wherein the...
US-9,078,128 System and method for secure identity service
A system and method for securely processing identity information. For example, in one embodiment of the invention, a first user is registered on an identity...
US-9,077,754 Systems and methods for nextproto negotiation extension handling using mixed mode
This disclosure is directed to systems and methods for handling the processing of a next protocol negotiation extension for a transport layer security (TLS)...
US-9,077,753 Method for securing name registries, network access and data communication in ID/locator split-base networks
The invention provides a new system for internet security. The internet network system comprises a first Edge Network 11 that comprises a Source Host (SH) 12, a...
US-9,077,739 Messaging security device
In one embodiment, a system can comprise an interface that receives data related to a communication session and a messaging security device component that...
US-9,077,702 Flow ownership assignment in a distributed processor system
A security device for processing network flows includes one or more packet processors configured to receive incoming data packets associated with one or more...
US-9,077,695 System and method for establishing an encrypted communication link based on IP address lookup requests
A network device stores an application program for a secure communications service and has processor configured to execute the application program. The...
US-9,077,690 Preservation of user data privacy in a network
An example apparatus is provided that receives a pseudonym and encrypted identifier, where the pseudonym is of a user's personal data. The pseudonym has been...
US-9,077,654 System and method for data center security enhancements leveraging managed server SOCs
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
US-9,077,547 System and method for securely transmitting data via an electronic marketplace
The present system and method comprises an improved marketplace for providing and consuming services. Using the present system, generally via one or more APIs,...
US-9,077,537 Generating secure private keys for use in a public key communications environment
A private key is generated for use in a public key communications environment, and the private key includes a partial private key and processed biometric data....
US-9,077,509 Secure threshold decryption protocol computation
The present invention relates to a method of converting an encrypted data set into an encryption of individual bits representing the data set. Further, the...
US-9,077,485 Automatic security action invocation for mobile communications device
A mobile communications device, method, and computer program product for providing security on a mobile communications device are described. In accordance with...
US-9,076,368 Image generation systems and image generation methods
Image generation systems and image generation methods are described. In one aspect, an image generation system includes an attachment system configured to...
US-9,076,280 Completion of portable data carriers
A method for completing at least one portable data carrier connected to a completion device, wherein a completion data set that is present on the completion...
US-9,076,142 Smart electronic wallet or smart e-wallet
The electronic wallet comprises a card duplicator, an electronic wallet or e-wallet, and an e-card. The card duplicator and the electronic wallet or e-wallet...
US-9,076,138 Method and apparatus for obfuscating slice names in a dispersed storage system
A method begins by a processing module receiving a data segment for dispersed storage. The method continues with the processing module encoding the data segment...
US-9,076,111 Methods of integrating multiple management domains
An integrated solution strategy that integrates multiple domains together in a seamless and standardized way for increasing a users control over facilities and...
US-9,076,004 Systems and methods for secure hybrid third-party data storage
The disclosed computer-implemented method for secure hybrid third-party data storage may include (1) identifying, at a trusted proxy system, an access request...
US-9,076,003 Method and apparatus for transparently encrypting and decrypting computer interface data
In general, embodiments of the invention include methods and apparatuses for securing otherwise unsecured computer interfaces by performing transparent data...
US-9,076,001 Method and apparatus for implementing a secure content pipeline
Systems, methods, and other embodiments associated with implementing a secure content pipeline are described. According to one embodiment, an apparatus includes...
US-9,075,986 Systems and methods for software application security management
Apparatus and method for managing password information associated with a service account are disclosed. In some embodiments, a service account management system...
US-9,075,978 Secure configuration of mobile applications
Secure configuration of a mobile application ("app") includes sending the required configuration data for the app to the user's mobile computing device in a...
US-9,075,970 Systems and methods for secure handling of secure attention sequences
A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine includes executing, by a desktop appliance, a user...
US-9,075,969 Systems and methods for secure handling of secure attention sequences
A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine includes executing, by a desktop appliance, a user...
US-9,075,960 Digital media content management apparatus and method
A digital media content management apparatus and method for securely storing a content file on a computer readable medium and playing the content file from the...
US-9,075,957 Backing up digital content that is stored in a secured storage device
A third party facilitates preparation of a backup SSD for backing up a source SSD. Digital data of the source SSD, which includes protected and sensitive data...
US-9,075,751 Secure data protection with improved read-only memory locking during system pre-boot
Generally, this disclosure provides methods and systems for secure data protection with improved read-only memory locking during system pre-boot including...
US-9,075,644 Secure recursive virtualization
A mechanism is provided for performing secure recursive virtualization of a computer system. A portion of memory is allocated by a virtual machine monitor (VMM)...
US-9,074,538 Abnormal combustion detection apparatus and control unit of internal combustion engine
An abnormal combustion detection apparatus detects an abnormal combustion of an internal combustion based on a vibration waveform from a vibration sensor...
US-9,072,560 Implant removal aid for use with implants utilizing a data carrier
A storage system for packaging and storing medical devices with associated data carriers, or tags that can be used for tracking inventory levels and uses of an...
US-9,072,186 Harness assembly
An assembly for physically securing, and providing data and power to, a portable electronic consumer product that has opposed sides that each include one or...
US-9,071,971 Adaptive and context based NFC access control filtering
A mobile device includes a transceiver for performing wireless communication; one or more secure elements which execute applications in a secure environment; a...
US-9,071,962 Evolved packet system non access stratum deciphering using real-time LTE monitoring
A monitoring system is coupled to interfaces in an LTE network and passively captures packets from the network interfaces. First data packets associated with an...
US-9,071,661 Data communication coordination with sequence numbers
Described are sequence numbers for client-server communication, to control a client's use of server resources. A server grants the client credits, and the...
US-9,071,646 Method, apparatus and program storage device for providing network perimeter security assessment
A method for providing network perimeter security assessment that involves a combination of perimeter security assessment disciplines is disclosed. A security...
US-9,071,642 System and method for securely transmitting data using video validation
Secure transmission of electronic information is provided between two parties. Included is a first data communication session between a first computing device...
US-9,071,627 Method and system for cloning applications from an electronic source device to an electronic target device
Security is enhanced for a user of electronic devices by providing a method for providing an application to an electronic device. According to an embodiment, an...
US-9,071,585 Copy offload for disparate offload providers
Aspects of the subject matter described herein relate to offload technology. In aspects, a source offload provider may transfer bulk data to a destination...
US-9,071,582 Communication apparatus, reception control method, and transmission control method
Lookaside-type communication apparatus and reception and transmission control methods make high-rate communication of a packet including encrypted data. Receive...
US-9,071,581 Secure storage with SCSI storage devices
A security command protocol provides secure authenticated access to an auxiliary security memory within a SCSI storage device. The auxiliary security memory...
US-9,071,580 Method and system for securing data of a mobile communications device
A method and system for securing data of a mobile communications device. The method includes: determining that first application data is data associated with a...
US-9,071,574 Access and control system for network-enabled devices
Systems and methods for remote access of network-enabled devices that provide seamless, firewall-compliant connectivity between multiple users and multiple...
US-9,071,447 Security system and method
A method for generating data encryption coding with variable clocking according to one embodiment includes storing a secret code in a first register; storing a...
US-9,071,429 Revocable shredding of security credentials
Customers accessing resources and/or data in a multi-tenant environment can obtain assurance that a provider of that environment will honor only requests...
US-9,071,189 Motor drive configuration system and method
A motor drive comprises a power sub-assembly and a control sub-assembly removably secured to the power sub-assembly. The power sub-assembly contains all power...
US-9,070,277 Meter capable of having communication security and data transmitting/receiving system using the same
Disclosed is a meter capable of having communication security and a data transmitting/receiving system using the same, the system being such that a the server...
US-9,070,129 Method and system for securing data fields
A merchant conducting a transaction on an account forms transaction data with a sensitive data field. To obscure the account prior to transmitting information...
US-9,070,007 Adjustable data reader with pivot mount
A data reading system for reading encoded data, such as barcode labels or RFID tags, from an item. The data reading system includes a housing, a data reader...
US-9,069,987 Secure data access using SQL query rewrites
A mechanism is provided for secure data access in a data processing system. A database having two tables is provided. A subset of the tables' primary key...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.