Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,086,819 System and method for combining deduplication and encryption of data
The embodiments herein relate to data management and, more particularly, to global deduplication and encryption of data in data management systems. The user...
US-9,086,812 Storage device, control method for same and system management program
A storage device has plural data disks including a primary data area and a backup data area. Performance and reliability are secured while conserving power. A...
US-9,086,793 Methods and systems for assessing security risks
A user interface facilitates assessing security risks for linear corridors. The interface includes a navigation window presenting geospatial data for an area...
US-9,086,692 Custom function blocks for use with process control systems
A system and method for creating and incorporating a function block within a process control system enables a user of the process control system to generate a...
US-9,086,347 Cryopreservation device with retrofitted electronic tracking device
The present invention is a cryopreservation device that has the ability to track and record preserved specimens using an integrated electronics system. The...
US-9,084,115 System and method for data verification using a smart phone
A system and method for data verification using a smart phone which verifies data and biometric identity information using only locally stored biometric...
US-9,084,078 Systems and methods for secure intermediary data transfers using close proximity wireless communication
The present disclosure provides systems and methods for utilizing close proximity wireless communication (CPWC) technology for a secure out-of-band (OOB)...
US-9,084,005 Two-dimensional barcode system
An end-user device, including a processor to prepare barcode-input data including (a) at least one of an identification of a user of the end-user device, and an...
US-9,083,745 Network independent location services
Techniques for supporting network independent location services (LCS) are described. In one design, a location center may communicate with a terminal to...
US-9,083,741 Network defense system and framework for detecting and geolocating botnet cyber attacks
A network defense system is described that provides network sensor infrastructure and a framework for managing and executing advanced cyber security algorithms...
US-9,083,729 Systems and methods for determining that uniform resource locators are malicious
A computer-implemented method for determining that uniform resource locators are malicious may include identifying a uniform resource locator that may be posted...
US-9,083,712 Method and apparatus for generating highly predictive blacklists
In one embodiment, the present invention is a method and apparatus for generating highly predictive blacklists. One embodiment of a method for generating a...
US-9,083,699 System and method of accessing keys for secure messaging
Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associated with the...
US-9,083,692 Apparatus and method of providing security to cloud data to prevent unauthorized access
A method and apparatus for providing security of an electronic apparatus are provided. The method includes identifying an environment of a client to be provided...
US-9,083,688 Systems and methods for providing multimedia content within an application and a security solution integrated...
A system is provided for downloading, for distribution and for acoustic reproduction of a music album, which includes at least one or several digital music...
US-9,083,683 Encryption/decryption device for secure communications between a protected network and an unprotected network...
The encryption/decryption device includes a plaintext unit, a ciphertext unit and a cryptographic unit connected therebetween. The plaintext unit may include a...
US-9,083,656 Service communication method and system for access network apparatus
A service communication method for an access network apparatus. The access network apparatus comprises a source terminal and a target terminal both connected to...
US-9,083,534 Method and system for propagating a client identity
A method and system for securely propagating client identities in a service call from a first system to a target service system are provided. The system...
US-9,083,516 Securing virtual lane physical layers
A data stream with a given data rate is distributed into a plurality of virtual lanes or streams, each with a lower data rate than the data stream. Virtual...
US-9,083,509 System and method of lawful access to secure communications
The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to...
US-9,083,123 Visually evident connection system for plug-in power/data cable
A visually evident connection system for a plug-in power/data cable including a power/data cable connector securable to a power/data cable. The connector is...
US-9,082,279 Method for securely dematerializing the transfer of evidence in data-stream production systems, in particular...
A method including putting in place an end-to-end secure network, digitally signing the recorded data, regardless of its type, encrypting the recorded sensitive...
US-9,082,237 Vehicle access and security based on biometrics
Method for interacting with a vehicle includes controlling interaction with the vehicle based on receipt of a signal by a component on the vehicle, and...
US-9,082,121 System and method for guided passcode entry
Systems and methods are provided for facilitating guided entry of a passcode. The exemplary guided passcode entry system provides additional security to...
US-9,082,120 Secure payment card transactions
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal,...
US-9,082,119 Virtualization and secure processing of data
Systems, methods, and non-transient machine-interpretable data representing executable instruction sets and/or other products for the processing of data for the...
US-9,081,983 Data distribution database and method for data distribution and verification
A distribution database includes at least one central database, in which data of use-value given by data a releaser and the values of use are stored, and...
US-9,081,970 Data security device
The invention provides an apparatus for storing data using solid state technology. The apparatus is configured to employ a destruction mechanism that damages...
US-9,081,952 Systems and methods for providing secure electronic document storage, retrieval and use with electronic user...
Systems and methods for efficient and timely electronic new user authentication in a digital mailbox system using a sliding scale approach to include one or...
US-9,081,781 Wireless portable device for creating and wirelessly transmitting digital audio and/or video
A portable wireless communications subscriber audio and/or video player apparatus and system and method for selecting, requesting, downloading, and playing...
US-9,081,749 Automatic language sensitive, event based activity feeds
A post is generated that identifies different types of activity in a computer system, such as changes to the data in the computer system. The post is generated...
US-9,081,635 Provision to an application of a random number not generated by an operating system
A data processing system includes data storage that stores an operating system and an application that performs a security operation and a processor...
US-9,081,529 Generation of electronic books
Described herein are systems and methods for modifying electronic books ("eBooks"). A server processes eBook data to determine portions of one or more source...
US-9,081,508 File processing method and storage device
A file processing method and a storage device are disclosed. In the method, a storage device receives T files that are to be stored in the RAID, and determines...
US-9,078,569 Configurable data measurement and acquisition systems for multi-slice X-ray computed tomography systems
A Data Measurement and Acquisition System (DMAS) for multi-slice X-ray CT systems and multi-slice X-ray CT systems using the DMAS are disclosed; wherein the...
US-9,078,128 System and method for secure identity service
A system and method for securely processing identity information. For example, in one embodiment of the invention, a first user is registered on an identity...
US-9,077,754 Systems and methods for nextproto negotiation extension handling using mixed mode
This disclosure is directed to systems and methods for handling the processing of a next protocol negotiation extension for a transport layer security (TLS)...
US-9,077,753 Method for securing name registries, network access and data communication in ID/locator split-base networks
The invention provides a new system for internet security. The internet network system comprises a first Edge Network 11 that comprises a Source Host (SH) 12, a...
US-9,077,739 Messaging security device
In one embodiment, a system can comprise an interface that receives data related to a communication session and a messaging security device component that...
US-9,077,702 Flow ownership assignment in a distributed processor system
A security device for processing network flows includes one or more packet processors configured to receive incoming data packets associated with one or more...
US-9,077,695 System and method for establishing an encrypted communication link based on IP address lookup requests
A network device stores an application program for a secure communications service and has processor configured to execute the application program. The...
US-9,077,690 Preservation of user data privacy in a network
An example apparatus is provided that receives a pseudonym and encrypted identifier, where the pseudonym is of a user's personal data. The pseudonym has been...
US-9,077,654 System and method for data center security enhancements leveraging managed server SOCs
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
US-9,077,547 System and method for securely transmitting data via an electronic marketplace
The present system and method comprises an improved marketplace for providing and consuming services. Using the present system, generally via one or more APIs,...
US-9,077,537 Generating secure private keys for use in a public key communications environment
A private key is generated for use in a public key communications environment, and the private key includes a partial private key and processed biometric data....
US-9,077,509 Secure threshold decryption protocol computation
The present invention relates to a method of converting an encrypted data set into an encryption of individual bits representing the data set. Further, the...
US-9,077,485 Automatic security action invocation for mobile communications device
A mobile communications device, method, and computer program product for providing security on a mobile communications device are described. In accordance with...
US-9,076,368 Image generation systems and image generation methods
Image generation systems and image generation methods are described. In one aspect, an image generation system includes an attachment system configured to...
US-9,076,280 Completion of portable data carriers
A method for completing at least one portable data carrier connected to a completion device, wherein a completion data set that is present on the completion...
US-9,076,142 Smart electronic wallet or smart e-wallet
The electronic wallet comprises a card duplicator, an electronic wallet or e-wallet, and an e-card. The card duplicator and the electronic wallet or e-wallet...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.