Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,129,095 Client-side encryption with DRM
A technique for extending security to a data object (e.g., a document, a file, a message, etc.) once it has been shared and during collaboration with others who...
US-9,128,877 Systems, methods and computer program products including features of transforming data involving a secure...
Systems and methods for transforming data involving a secure format from which the data is recoverable. In one implementation, there is provided a method of...
US-9,128,709 Dividing a power input and directly providing divided power to an output terminal in a power control circuit
A memory card with a smart card function including a flash memory unit, a data processing control unit, and a power control unit is provided. The data...
US-9,128,626 Distributed virtual storage cloud architecture and a method thereof
The present disclosure relates to a distributed information storage system which functions as virtual cloud storage overlay on top of physical cloud storage...
US-9,126,120 Apparatuses, methods and systems for a virtual security camera
The APPARATUSES, METHODS AND SYSTEMS FOR AN ONLINE BEHAVIOR MONITOR ("OBM") transform user social-gaming behavioral pattern data via various OBM components into...
US-9,125,186 Wi-Fi access point and system for establishing data transmission channel
A Wi-Fi access point (AP) is provided. The Wi-Fi AP includes a femtocell signaling interface, a WAN interface, a Wi-Fi AP radio access interface, and a...
US-9,125,052 Near field registration of home system audio-video device
A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC...
US-9,124,930 In-circuit security system and methods for controlling access to and use of sensitive data
The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential...
US-9,124,820 Content-based security processing using distributed scan management protocols
A method and apparatus is provided for processing acquired document data, using distributed scan management protocols, according to a security classification of...
US-9,124,771 Valid replacement data in encoded video
A security method for H.264 video streams and the like is provided that comprises: coding video data with incorrect or missing bytes, whereby the coded video is...
US-9,124,770 Method and system for prevention of control word sharing
A method and system of preventing control word sharing, the method and system including receiving a temporal key, denoted TK.sub.i, at a removable security...
US-9,124,768 Portable electronic entity capable of receiving broadcast multimedia data flow
A portable electronic entity includes a communication interface (110) with a host terminal (TH), a conversion system (170) for a signal received in a secure...
US-9,124,641 System and method for securing the data and information transmitted as email attachments
A system for securing data and information transmitted via entails is disclosed. The system includes a sender-side device from which an email including a first...
US-9,124,640 Systems and methods for implementing computer security
A computing device includes a security control module to monitor and control security of the operating system and security of one or more applications executing...
US-9,124,636 Infected endpoint containment using aggregated security status information
In one example, a network device may store health status information specifying a current security status for each of a plurality of authenticated endpoint...
US-9,124,635 Verified sensor data processing
Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example,...
US-9,124,622 Detecting computer security threats in electronic documents based on structure
In an embodiment, a data processing method providing an improvement in computer security comprises selecting, from a queue identifying a plurality of web pages,...
US-9,124,619 Directing audited data traffic to specific repositories
Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules...
US-9,124,602 Method and apparatus for creating custom access control hierarchies
The Custom Access Controller adds a custom security hierarchy to the organizational data in the View Processor of WEBSPHERE Virtual Member Manager. Whenever an...
US-9,124,580 Method and system for securely establishing cryptographic keys for aircraft-to-aircraft communications
A method and system for encrypting communications between two aircraft on the ground at an airport. Each aircraft is coupled to a ground network via a broadband...
US-9,124,579 Security-enhanced cloud system and security management method thereof
A security-enhanced cloud system is provided. The system includes a mobile terminal for creating fingerprint recognition information and face recognition...
US-9,124,571 Network authentication method for secure user identity verification
In a network authentication method, a content-provider server redirects a user terminal to an identity verification server for acquiring therefrom an encrypted...
US-9,124,566 Browser plug-in for secure credential submission
Described is a technology by which a plug-in (e.g., an ActiveX.RTM. control) instantiated by a web browser calls functions of a credential service to use a set...
US-9,124,561 Method of transferring the control of a security module from a first entity to a second entity
A method is provided for transferring control of a security module from a first entity to a second entity. The security module has a first security domain...
US-9,124,558 Method and apparatus of handling data decryption for a packet data convergence protocol layer in a wireless...
The present invention provides a method of handling data decryption for a Packet Data Convergence Protocol layer of a user equipment upon handover in a wireless...
US-9,124,553 System and method for automatic data security back-up and control for mobile devices
Systems and methods for providing security and control of mobile communications device activity including at least one mobile communication device with software...
US-9,124,550 Distributed multi-processing security gateway
Systems and methods for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on...
US-9,124,421 Data prioritization, storage and protection in a vehicular communication system
This disclosure is directed to data prioritization, storage and protection in a vehicular communication system. A black box (BB) in a vehicle may receive data...
US-9,123,228 Security alarm systems and methods for collecting and utilizing condition data
A security alarm system having a plurality of features. Among other features, the security alarm system includes a plurality of secondary sensors, which refers...
US-9,123,086 Automatically generating event objects from images
A mobile data analysis system is provided that enables mobile device location tracking, secure messaging, and real-time sharing of intelligence information,...
US-9,123,040 Systems and methods for encoded alias based transactions
Disclosed is a computer based method for securing a financial transaction. A transaction device does not include any human readable data that can be used to...
US-9,123,024 System for analyzing security compliance requirements
A system for analyzing security compliance requirements analyzes a linked database that includes data from the Unified Compliance Framework.TM.. The system...
US-9,122,990 Method and system for management of security rule set
There are provided a method of automated managing one or more security rule-sets and a system thereof. The method comprising: obtaining data characterizing a...
US-9,122,892 Protection device, protection software, and protection method for controlling external device
A protection device controlling an external device is provided having a mode detector, security data, a data detector, and a controller. The external device...
US-9,122,890 Secure mechanism to switch between different domains of operation in a data processor
A data processing apparatus including processing circuitry having a secure domain and a further different secure domain and a data store for storing data and...
US-9,122,887 User interface for secure virtual document management system
A user interface for a virtual file management system that provides user access to managed content on mobile devices. The system comprises storage domains...
US-9,122,882 Method and apparatus of securely processing data for file backup, de-duplication, and restoration
Disclosed are an apparatus and method of de-duplicating at least one data file. One example method may include requesting a list of data rows stored in a...
US-9,122,880 Sensitive personal information data protection
A computing device may be configured to provide operations related to providing additional security for sensitive personal information (SPI) in data records of...
US-9,122,868 Method for securing a transaction performed with a programmable portable device
A method for securing a transaction between a transaction device and an external device is described. The transaction device includes a communication...
US-9,122,853 Location determination for user authentication
User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two...
US-9,122,686 Naming service in a clustered environment
Within a cluster, when a new server node joins the cluster, an indication of the new server node has joined is received by at least one server node in the...
US-9,122,633 Case secure computer architecture
Two computing subsystems are disclosed, one a control subsystem, the other a user subsystem, each using engines with augmented conventional instruction sets,...
US-9,122,600 Systems and methods for remote monitoring in a computer network
Systems and methods for providing automated problem reporting in elements used in conjunction with computer networks are disclosed. The system comprises a...
US-9,122,534 Secure application partitioning enablement
A computer implemented method, data processing system, and computer program product for configuring a partition with needed system resources to enable an...
US-9,121,957 Radiation modulation in a security examination apparatus
Radiation flux can be adjusted "on the fly" as an object (204) is being scanned in a security examination apparatus. Adjustments are made to the radiation flux...
US-9,121,802 Method for characterizing integrated circuits for identification or security purposes
A method of detecting small changes to a complex integrated circuit measuring RF/microwave scattering parameters between every pin over a wide frequency range....
US-9,120,345 Printer for automatic packing machine and method of controlling the same
The present disclosure provides a printer for an automatic packing machine, which employs a ribbon cartridge to facilitate replacement of a ribbon tape and...
US-9,119,072 Method and apparatus to authenticate a personal device to access an enterprise network
In an embodiment, a device includes a processor to initialize a first wireless communication path with a computation device and initialize a second wireless...
US-9,119,067 Embodiments of a system and method for securely managing multiple user handles across multiple data processing...
A system and method for are described for securely linking a phone number and user identification code in a directory database. A computer-implemented method...
US-9,119,061 Integrated wafer scale, high data rate, wireless repeater placed on fixed or mobile elevated platforms
Methods and systems are provided for relocatable repeaters for wireless communication links to locations that may present accessibility problems using, for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.