Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,092,621 Method of detecting fault attack
In a method of detecting a fault attack in a secure memory device, payload data is initialized by determining whether the payload data is consistent. The...
US-9,092,619 Data processing apparatus
A data processing apparatus is provided, which detects falsification of software to data and rewriting of the data. The data processing apparatus according to...
US-9,092,612 Method and system for secure access to data files copied onto a second storage device from a first storage device
A method and system for secure access to data files copied onto a second storage device from a first storage device. A computer receives data from a first...
US-9,092,611 Adaptive, multi-level security for flight deck applications hosted on mobile platforms
A mobile computing platform for processing data in an environment requiring multiple levels of authentication may include processes to authenticate various...
US-9,092,605 Ongoing authentication and access control with network access device
Methods and systems are presented for securing network access. One method includes operations for granting a user access to remote computer resources after...
US-9,092,494 Information vault, data format conversion services system and method
A system and method for providing a secured information vault so that individual owners of personal data may control and manage the access and dissemination of...
US-9,092,373 Microcomputer with bootable flash memory
The present invention provides a microcomputer having a CPU, a flash ROM which stores programs or the like therein and a read controller which controls reading...
US-9,092,372 Memory access authority control method and memory management system thereof
A memory access authority control method and a memory management system utilizing the method. By partitioning and designating permissible memory access...
US-9,092,181 Distributed print management
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-9,092,157 Wireless internet-accessing module, host, communication method thereof, and data card
A communication method for a host and a wireless Internet access module, and a data card, are provided so that the host implements wireless Internet access with...
US-9,092,029 Vehicle monitoring system
An example reconfigurable vehicle monitoring arrangement includes a housing securable relative to a vehicle, a communication base at least partially disposed...
US-9,089,066 Arrangement of a rack and a medical device
In an arrangement of a rack (1) and a medical device (2) to be attached to the rack (1), the rack (1) comprises a first connection element (111) and the medical...
US-9,088,890 Method and apparatus for encrypting short data in a wireless communication system
A method and apparatus is capable of encrypting short data in a wireless communication system When a terminal generates a short data burst in idle mode, the...
US-9,088,888 Secure wireless communication using rate-adaptive codes
Data are communicated in a wireless network, between a transmitter and a receiver. The transmitter estimates a first channel response between the receiver and...
US-9,088,805 Encrypted memory device and methods for use therewith
A video processing device is presented for processing video data. This video processing device protects the security of data via encryption when it is stored on...
US-9,088,735 Computer-based system and method for adding variable security data in printing operations
A computer-based method and a system for adding and printing variable security data. The system includes a memory, a processor, and a printer. The memory stores...
US-9,088,615 Determining a reduced set of remediation actions for endpoint integrity
In general, the disclosure relates to techniques for identifying a reduced set of remediation actions that are to be performed by a network endpoint to achieve...
US-9,088,603 File transfer method and device
Embodiments of the present invention provide a file transfer method. A file is received and cached from a sending device. At least one data packet is sent to a...
US-9,088,595 Method and apparatus for packet source validation architecture system for enhanced internet security
A system of enhanced global computer network security provides for a globally unique human signature code that is provided in the header of a data packet and...
US-9,088,568 Apparatus, system and method for secure data exchange
A SDE manager, a method of communicating secure data through a generic electronic delivery system and a SDE client located on a computing device of a user are...
US-9,088,558 Secure one-way interface for OPC data transfer
A system for transmitting OPC information from a first network in a first security domain to a second network in a second security domain. A first stand-alone...
US-9,088,557 Encryption key management program, data management system
An objective of the present invention is to ensure security of the file sharing function provided by cloud storages without significantly decreasing the...
US-9,088,538 Secure network storage
This invention includes a synchronized storage server enabled to send the end-point device a notification including the root folder list. The end-point device...
US-9,088,429 Method for operating, monitoring and/or configuring an automation system of a technical plant
A method for operating, monitoring and/or configuring an automation system of a technical plant from a remote device may include a control software ensuring...
US-9,088,416 Method for securely associating data with HTTP and HTTPS sessions
A computing system, method and product comprising a server, a mobile device comprising a client interconnected with the server via a data network, the client...
US-9,088,335 Method and system of providing link adaptation for maximizing throughput in mobile satellite systems
Various approaches are introduced to provide link adaptation to maximize the resource utilization of the satellite network: (i) a method to adapt the...
US-9,088,304 Interface deactivation for communication between electronic appliances
A method for controlling the flow of data in a near field communication appliance having an interposed element and a plurality of secure elements is disclosed....
US-9,087,613 Device and method for repairing memory cell and memory system including the device
Provided are a method and an apparatus for repairing a memory cell in a memory test system. A test device detects a fail address by testing a memory device...
US-9,087,233 Security by Z-face detection
A method for identifying a person using a mobile communication device, having a camera unit adapted for recording three-dimensional (3D) images, by recording a...
US-9,087,220 Nonvolatile memory cell with authentication key storage
A nonvolatile memory device includes a memory cell array configured to store an authentication key and authentication key configuration information in first and...
US-9,087,218 Trusted path
In some embodiments, techniques for secure data entry comprise receiving a request for secure data entry associated with a data recipient; receiving an intended...
US-9,087,217 Method for enhancing data reliability in a computer
A method for enhancing reliability of data is provided. A computer configured to provide output datum (Ds) from input datum (De), includes at least two data...
US-9,087,216 Dynamic de-identification and anonymity
Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity and security by enabling subjects to...
US-9,087,215 Dynamic de-identification and anonymity
Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity and security by enabling subjects to...
US-9,087,212 Methods and apparatus for securing a database
Methods and apparatus for a system to maintain confidentiality of data in a database management system by selecting encryption schemes for data items, storing...
US-9,087,209 Database access control
A method for database access control includes receiving an access request from a requesting user, the access request identifying one or more data entries stored...
US-9,087,205 Shared encrypted storage
An improved key encryption system is provided for encrypting sensitive data on a shared data store. Various embodiments contemplate a system where a plurality...
US-9,087,204 Airport security check system and method therefor
A decryption system for decrypting user identification information encrypted on a storage device associated with a user identity document is disclosed. The...
US-9,087,200 Method and apparatus to provide secure application execution
A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an...
US-9,087,190 Context-aware permission control of hybrid mobile applications
Controlling access to secure resources of a data processing system is provided. An input-to-output mapping of an application installed on the data processing...
US-9,087,185 Server device for transmitting and receiving data to and from client device through access point
A server device for transmitting and receiving data to and from a client device over a wireless communication network including an access point, the server...
US-9,086,996 Nonvolatile memory, reading method of nonvolatile memory, and memory system including nonvolatile memory
A nonvolatile memory device includes a memory cell array and a read/write circuit connected to the memory cell array through bit lines. The read method of the...
US-9,086,951 Image reading apparatus
An image reading apparatus includes an image data compression unit, an attribute data compression unit, and a memory. Of image data and attribute data generated...
US-9,086,819 System and method for combining deduplication and encryption of data
The embodiments herein relate to data management and, more particularly, to global deduplication and encryption of data in data management systems. The user...
US-9,086,812 Storage device, control method for same and system management program
A storage device has plural data disks including a primary data area and a backup data area. Performance and reliability are secured while conserving power. A...
US-9,086,793 Methods and systems for assessing security risks
A user interface facilitates assessing security risks for linear corridors. The interface includes a navigation window presenting geospatial data for an area...
US-9,086,692 Custom function blocks for use with process control systems
A system and method for creating and incorporating a function block within a process control system enables a user of the process control system to generate a...
US-9,086,347 Cryopreservation device with retrofitted electronic tracking device
The present invention is a cryopreservation device that has the ability to track and record preserved specimens using an integrated electronics system. The...
US-9,084,115 System and method for data verification using a smart phone
A system and method for data verification using a smart phone which verifies data and biometric identity information using only locally stored biometric...
US-9,084,078 Systems and methods for secure intermediary data transfers using close proximity wireless communication
The present disclosure provides systems and methods for utilizing close proximity wireless communication (CPWC) technology for a secure out-of-band (OOB)...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.