Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,176,543 Access using a mobile device with an accelerometer
Embodiments of the present invention are directed to systems, apparatuses and methods for using a mobile device with an accelerometer to gain access into a...
US-9,176,025 Apparatus and method of vibration testing for manufacturing defect detection in composite insulators
The present application relates to an apparatus and method for detecting defects in composite insulators used in power systems. The apparatus includes a test...
US-9,173,992 Secure pairing of electronic devices using dual means of communication
The present invention relates to secure paring of electronically controlled devices configured to communicate with each other. A medical system is provided...
US-9,173,104 Mobile device with device agents to detect a disallowed access to a requested mobile data service and guide a...
An end-user mobile device has a cellular network modem that is capable of communication over multiple carrier access networks. Prior to activation of the device...
US-9,173,102 Method for updating a data carrier
The invention provides a method for updating a data carrier inserted in a telecommunication end device with regard to a data-carrier application executable in...
US-9,173,085 Methods and apparatus for use in transferring an assignment of a secure chip subscription managers
Techniques for use in transferring an assignment of a secure chip of a wireless device from a current subscription manager (SM) of a current mobile network...
US-9,172,917 Internet protocol security camera connected light bulb/system
The present invention concerns an apparatus comprising an antenna module and a control module. The antenna module may be configured to connect and send data to...
US-9,172,722 Method for network access, related network and computer program product therefor
A method of providing access of a mobile terminal to an IP network includes establishing a security association between the mobile terminal and a first security...
US-9,172,712 Method and system for improving website security
A method for locating and monitoring websites is provided that includes finding websites and contained hyperlinks, downloading a first snapshot of a web page...
US-9,172,700 Computer program and method for biometrically secured, transparent encryption and decryption
A computer program for enabling secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out...
US-9,172,698 System and method for key generation in security tokens
Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used...
US-9,172,691 System for secure enrollment and secure verification of network users by a centralized identification service
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the...
US-9,172,685 System and method for providing a secure book device using cryptographically secure communications across...
A system for integrating access to separate and physically partitioned networks from a single client device is described. The system is interposed between the...
US-9,172,680 Systems and methods for enabling secure messaging, command, and control of remote devices, communicated via a...
Given the rise in popularity of communicating personal, private, sensitive, or vital peer-to-peer or peer-to-group information over potentially insecure text...
US-9,172,580 Selecting transceiver for wireless network based on security keys
Systems, methods, and software for operating communication systems and wireless communication devices are provided herein. In one example, a method is provided...
US-9,172,559 Method, apparatus, and network system for terminal to traverse private network to communicate with server in...
Embodiments of the present invention provide a method, an apparatus, and a network system for a terminal to traverse a private network to communicate with a...
US-9,172,541 System and method for pool-based identity generation and use for service access
A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment...
US-9,172,528 Method and apparatus for allowing software access to navigational data in a decrypted media stream while...
A method, apparatus and system enabling software access to navigational data in a decrypted media stream while protecting stream payloads. In one embodiment, a...
US-9,171,442 Item identification using video recognition to supplement bar code or RFID information
A method and system for confirming the identity of a product in a security system and for determining sales-related information pertaining to the products. One...
US-9,171,347 System and method for analysis and authentication of covert security information using a smart device
A system and method for hidden security feature detection, analysis and authentication using a smart device is disclosed. The smart device can detect and...
US-9,171,191 Method for dynamic authentication between reader and tag, and device therefor
The present disclosure discloses a method for dynamic authentication between a reader and a tag, and an implementing device therefor, to solve the technical...
US-9,171,178 Systems and methods for optimizing security controls for virtual data centers
A computer-implemented method for optimizing security controls for virtual data centers may include 1) identifying a security policy that applies to at least...
US-9,171,176 Data access control systems and methods
Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a...
US-9,171,175 Data programming control system with secure data management and method of operation thereof
A method of operation of a data programming control system includes: providing a secure data management host server coupled to a network; encrypting a contract...
US-9,171,170 Data and key separation using a secure central processing unit
A computing system, comprising includes a first central processing unit (CPU) and a second CPU coupled with the first CPU and with a host processor. The second...
US-9,171,147 Process and system for strengthening password security
A process and a system that create and encrypt rich formatted passwords that increase password strength and security in some embodiments are disclosed. The...
US-9,171,133 Securing a device and data within the device
Systems and methods are provided for securing a self-securing device and information that is stored in memory within the device. The self-securing device...
US-9,171,021 Method and system for configuring storage device in hybrid storage environment
The present invention provides a method and a system for configuring a storage device in a hybrid storage environment. The method includes: acquiring a...
US-9,170,297 Secure low pin count scan
A contactless smartcard type integrated circuit needing only two pins for performing a standard ATPG test is disclosed. A scan test may be performed using one...
US-9,168,001 Adhesively mounted apparatus for determining physiological and contextual status
The invention comprises an apparatus for determining the contextual or physiological status of the individual wearing the apparatus. The apparatus is designed...
US-9,167,433 Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data...
US-9,167,423 Wireless handheld configuration device for a securable wireless self-organizing mesh network
A self-organizing mesh network is made up of individual devices configured to use other network devices to pass data from one point to another. The network also...
US-9,167,317 Battery monitoring system
A battery monitoring system including an on-site battery event monitor (BEM) that sends out battery-related data to a server over a wide area network (WAN). The...
US-9,167,165 Visual communications system employing video imagery
A system and method for platform independent LOS visual information transmission is disclosed. A transmitter consists of a series of sequential images that are...
US-9,167,001 Scalable network security with fast response protocol
This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying...
US-9,166,999 Security risk aggregation, analysis, and adaptive control
Methods and apparatuses, including computer program products, are described for transaction-based security risk aggregation and analysis. A server computing...
US-9,166,989 Storing log data efficiently while supporting querying
A logging system includes an event receiver and a storage manager. The receiver receives log data, processes it, and outputs a column-based data "chunk." The...
US-9,166,971 Authentication using an external device
In some embodiments, techniques for computer security comprise receiving request data, wherein the request data includes identity-related information relating...
US-9,166,968 Information processing apparatus, control method thereof, storage medium, and image processing apparatus
A user credential sharing mechanism which can suitably implement a single sign-on function while preventing illicit accesses by accidental matches of...
US-9,166,962 Mobile communications device providing heuristic security authentication features and related methods
A mobile communications device may include a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of...
US-9,166,884 Network location service
A method is provided for a network location service in which one or more packet forwarding devices in the network collect and maintain location data for the...
US-9,166,874 Communication network system and communication network configuration method
A redundant path configuration method and a control method are disclosed. An intercommunication path for mutually transmitting and receiving a signal is...
US-9,166,796 Secure biometric cloud storage system
A secure and scalable data storage system that includes a server and a plurality of clients. The server maintains an access permission file that includes a...
US-9,166,782 Dynamic distributed key system and method for identity management, authentication servers, data security and...
A distributed key encryption system and method is provided in which a key storage server provides a session key to the source and destination computers by...
US-9,166,779 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-9,165,667 Electronic device with solid state drive and associated control method
An electronic device with a solid state drive and associated control method are provided. The electronic device includes: a host; a power supply component, for...
US-9,165,663 Secure non-volatile memory device and method of protecting data therein
The invention relates to a non-volatile memory device comprising: an input for providing external data to be stored on the non-volatile memory device; a first...
US-9,165,416 Digital over-the-air keying system
A system for providing operational access to equipment or vehicles is disclosed wherein digital access codes are assigned and transported over-the-air governing...
US-9,165,336 Method and apparatus for checking a security feature of a value document
A method includes checking a specified security feature of a value document which is present in a specified security-feature region of the value document. The...
US-9,165,173 Security method using an imaging barcode reader
A security method using an imaging barcode reader which captures image data for security purposes. An example method includes receiving an unauthorized activity...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.