Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,124,561 Method of transferring the control of a security module from a first entity to a second entity
A method is provided for transferring control of a security module from a first entity to a second entity. The security module has a first security domain...
US-9,124,558 Method and apparatus of handling data decryption for a packet data convergence protocol layer in a wireless...
The present invention provides a method of handling data decryption for a Packet Data Convergence Protocol layer of a user equipment upon handover in a wireless...
US-9,124,553 System and method for automatic data security back-up and control for mobile devices
Systems and methods for providing security and control of mobile communications device activity including at least one mobile communication device with software...
US-9,124,550 Distributed multi-processing security gateway
Systems and methods for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on...
US-9,124,421 Data prioritization, storage and protection in a vehicular communication system
This disclosure is directed to data prioritization, storage and protection in a vehicular communication system. A black box (BB) in a vehicle may receive data...
US-9,123,228 Security alarm systems and methods for collecting and utilizing condition data
A security alarm system having a plurality of features. Among other features, the security alarm system includes a plurality of secondary sensors, which refers...
US-9,123,086 Automatically generating event objects from images
A mobile data analysis system is provided that enables mobile device location tracking, secure messaging, and real-time sharing of intelligence information,...
US-9,123,040 Systems and methods for encoded alias based transactions
Disclosed is a computer based method for securing a financial transaction. A transaction device does not include any human readable data that can be used to...
US-9,123,024 System for analyzing security compliance requirements
A system for analyzing security compliance requirements analyzes a linked database that includes data from the Unified Compliance Framework.TM.. The system...
US-9,122,990 Method and system for management of security rule set
There are provided a method of automated managing one or more security rule-sets and a system thereof. The method comprising: obtaining data characterizing a...
US-9,122,892 Protection device, protection software, and protection method for controlling external device
A protection device controlling an external device is provided having a mode detector, security data, a data detector, and a controller. The external device...
US-9,122,890 Secure mechanism to switch between different domains of operation in a data processor
A data processing apparatus including processing circuitry having a secure domain and a further different secure domain and a data store for storing data and...
US-9,122,887 User interface for secure virtual document management system
A user interface for a virtual file management system that provides user access to managed content on mobile devices. The system comprises storage domains...
US-9,122,882 Method and apparatus of securely processing data for file backup, de-duplication, and restoration
Disclosed are an apparatus and method of de-duplicating at least one data file. One example method may include requesting a list of data rows stored in a...
US-9,122,880 Sensitive personal information data protection
A computing device may be configured to provide operations related to providing additional security for sensitive personal information (SPI) in data records of...
US-9,122,868 Method for securing a transaction performed with a programmable portable device
A method for securing a transaction between a transaction device and an external device is described. The transaction device includes a communication...
US-9,122,853 Location determination for user authentication
User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two...
US-9,122,686 Naming service in a clustered environment
Within a cluster, when a new server node joins the cluster, an indication of the new server node has joined is received by at least one server node in the...
US-9,122,633 Case secure computer architecture
Two computing subsystems are disclosed, one a control subsystem, the other a user subsystem, each using engines with augmented conventional instruction sets,...
US-9,122,600 Systems and methods for remote monitoring in a computer network
Systems and methods for providing automated problem reporting in elements used in conjunction with computer networks are disclosed. The system comprises a...
US-9,122,534 Secure application partitioning enablement
A computer implemented method, data processing system, and computer program product for configuring a partition with needed system resources to enable an...
US-9,121,957 Radiation modulation in a security examination apparatus
Radiation flux can be adjusted "on the fly" as an object (204) is being scanned in a security examination apparatus. Adjustments are made to the radiation flux...
US-9,121,802 Method for characterizing integrated circuits for identification or security purposes
A method of detecting small changes to a complex integrated circuit measuring RF/microwave scattering parameters between every pin over a wide frequency range....
US-9,120,345 Printer for automatic packing machine and method of controlling the same
The present disclosure provides a printer for an automatic packing machine, which employs a ribbon cartridge to facilitate replacement of a ribbon tape and...
US-9,119,072 Method and apparatus to authenticate a personal device to access an enterprise network
In an embodiment, a device includes a processor to initialize a first wireless communication path with a computation device and initialize a second wireless...
US-9,119,067 Embodiments of a system and method for securely managing multiple user handles across multiple data processing...
A system and method for are described for securely linking a phone number and user identification code in a directory database. A computer-implemented method...
US-9,119,061 Integrated wafer scale, high data rate, wireless repeater placed on fixed or mobile elevated platforms
Methods and systems are provided for relocatable repeaters for wireless communication links to locations that may present accessibility problems using, for...
US-9,118,754 System and method for providing a public/private telephone number system
This invention shows a method for operating a voice communications network that comprises dynamically associating a private number with at least one public...
US-9,118,712 Network communication system with improved security
A computer network communication method and system wherein software rendering software is interposed in the data communication path between a browser running on...
US-9,118,706 Using imported data from security tools
A device may create a new project that includes criteria, import findings from a group of different network security tools into the new project based on the...
US-9,118,689 Archiving systems and methods for cloud based systems
A cloud based security method and processing node includes monitoring data traffic between a user and an external network, wherein the monitoring is performed...
US-9,118,675 3D cloud lock
In embodiments, a method of securing access to a computer memory and other computer resources includes authoring a 3D projection of data by a registering user...
US-9,118,673 Methods and systems for secure key entry via communication networks
According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be...
US-9,118,666 Computing device integrity verification
An integrity verification process is performed by an integrity verification module of a client computing device. When the computing device is powered-up, but...
US-9,118,665 Authentication system and method
A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided...
US-9,118,654 Methods and systems for compliance monitoring in secure media-based conferencing
Methods and apparatuses, including computer program products, are described for compliance management of media-based (e.g., video and/or audio) conference...
US-9,118,649 Method and system for an electronic device with integrated security module
Methods and systems for processing Ethernet data are disclosed and may comprise receiving Ethernet data via a single gigabit Ethernet IP telephone chip. A...
US-9,118,642 Asset streaming
A device streams assets to network-based storage, and servers administering the network-based storage operate to notify other authorized devices that the assets...
US-9,118,639 Trusted data processing in the public cloud
Generally, this disclosure describes a system and method for trusted data processing in the public cloud. A system may include a cloud server including a...
US-9,118,631 Mixing secure and insecure data and operations at server database
Processing a query, includes, at a client, receiving a user-generated query having a plurality of recognizable terms, securing the user-generated query to...
US-9,118,555 Secure unauthenticated virtual local area network
A networking apparatus is used in connection with a virtual local area network (VLAN). The networking apparatus includes a control circuit and a policy circuit....
US-9,118,464 Set of servers for "machine-to-machine" communications using public key infrastructure
A set of servers can support secure and efficient "Machine to Machine" communications using an application interface and a module controller. The set of servers...
US-9,118,356 Data transport in portable electronic devices
The described embodiments relate generally to a dielectric wave guide interconnect for an electronic device including a first routing circuit, a second routing...
US-9,117,487 Method and system for disc authentication and security
A method and apparatus for disc authentication are disclosed. The authentication method includes measuring at least one physical property of a data disc, which...
US-9,117,328 Automated banking machine that operates responsive to data
In an example embodiment, an automated banking machine is provided which may comprise a trusted platform (TP) including a trusted platform module (TPM) in a...
US-9,117,210 Systems and methods for randomized mobile payment
Systems and methods for improving security in mobile payment systems are described. A user device may be operated to request temporary account data for an...
US-9,117,153 Data carrier having a contact plate with printing thereon
A data carrier having a main card body and a contact plate included on a surface of said main card body, wherein an area of the contact plate has a printed...
US-9,117,095 Data security for digital data storage
A computing system includes data encryption in the data path between a data source and data storage devices. The data encryption may utilize a key which is...
US-9,117,090 System and method for a secure data collection system
The system may provide for the collection of data in a heterogeneous network, long term secure storage of the data, and secure transfer of the data to an...
US-9,117,087 System and method for creating a secure channel for inter-application communication based on intents
System and method for creating a secure channel for inter-application communication based on the messaging system called Intents in the Android OS are...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.