Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,286,477 Secure app ecosystem with key and data exchange according to enterprise information control policy
Multiple apps of an ecosystem on a computer securely exchange encrypted data according to an information control policy of an enterprise, without allowing...
US-9,286,475 Systems and methods for enforcement of security profiles in multi-tenant database
Embodiments relate to systems and methods for the enforcement of security profiles in a multi-tenant database. A multi-tenant database can be populated with...
US-9,286,472 Efficient packet handling, redirection, and inspection using offload processors
A packet handling system is disclosed that can include at least one main processor, a plurality of offload processors connected to a memory bus and configured...
US-9,286,471 Rules based detection and correction of problems on mobile devices of enterprise users
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-9,286,457 Method and system for providing password-free, hardware-rooted, ASIC-based authentication of a human to a...
Biometric data are obtained from a biometric sensor on a mobile device, containing an ASIC, which is connected to or incorporated within it. The mobile device...
US-9,286,455 Real identity authentication
A real identity biometric authentication device includes a USB thumb drive form factor, with a biometric sensor and designated device processor and stored...
US-9,286,242 Information processing apparatus and program execution method
According to one embodiment, an information processing apparatus includes a processor, a main memory, and a memory controller. The memory controller executes an...
US-9,286,041 Software analysis framework
Presently described is a decompilation method of operation and system for parsing executable code, identifying and recursively modeling data flows, identifying...
US-9,282,898 End-to-end trusted communications infrastructure
A method of delivery of medical data via a trusted end-to-end communication link. The method comprises obtaining a measurement of a parameter of a human being...
US-9,282,105 Wide area network access management computer
A system and method for connecting a classified internet protocol (IP) network to a public IP network including an unclassified computing device. The...
US-9,282,102 Secure front-end interface
A secure front-end interface for a PLC, RTU or similar device is disclosed. A first server is coupled to the PLC via a communications link and is configured to...
US-9,282,093 Synchronizing credential hashes between directory services
The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a...
US-9,282,040 Smarter policy decisions based on metadata in data flows
Modern day user applications leverages new communication technologies such as WebRTC, WebEx, and Jabber allow devices to connect and exchange media content...
US-9,281,872 Near-field communication authentication
Various aspects are directed to circuit apparatuses, portable electronic devices, and executable applets pertaining to storing and providing secure access to...
US-9,281,219 Molecular receptor-based chemical field-effect transistor (CHEMFET) devices, systems, and methods for in-situ...
Embodiments include a method for securing a membrane material to a gate of a molecular receptor-based chemical field-effect transistor (CHEMFET). The method can...
US-9,280,907 Proctored performance analysis
Systems and methods described herein provide for administering and proctoring of a secure online exam that allows for complex testing utilizing practical...
US-9,280,770 Secure point of sale presentation of a barcode at an information handling system display
Unauthorized copying of a transaction barcode is prevented by including a sensed condition or other publicly-accessible data with the transaction barcode for...
US-9,280,732 Printing device, printing control method and recording medium capable of interruption printing with high security
A LAN control unit receives print data from a client device or the like. An input job storage unit registered on a hard disk a series of PDL commands included...
US-9,280,678 Secure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application...
US-9,280,677 Secure native application messaging with a browser application
A system for securely mediating messages between a native application and a browser application on a computing device includes running the browser application...
US-9,280,676 Development of business applications
In accordance with aspects of the disclosure, a system and methods are provided for managing development of business applications. The system and methods may be...
US-9,280,675 Encrypting and storing confidential data
Data storage circuitry for securely storing confidential data and a data processing apparatus for processing and storing the data and a method are disclosed....
US-9,280,672 Method for secure production printing
A method for printing a composite document creates a fixed data unit for a composite document, the fixed data unit being a portion of an individual document...
US-9,280,667 Persistent host determination
A system comprises a security manager to scan a network for host instances representing hosts on the network at that time, and record characteristics of the...
US-9,280,655 Application authentication method and electronic device supporting the same
A method for operating an electronic device is provided. The method includes executing, by a processor of the electronic device operable in a first mode (e.g. a...
US-9,280,490 Secure computing
Techniques and logic are presented for encrypting and decrypting programs and related data within a multi-processor system to prevent tampering. The decryption...
US-9,279,687 Data security system for a navigation system
A data security system for a navigation system comprising an enabling/disabling unit for enabling or disabling a data transfer from a data memory to a data...
US-9,277,423 Method and apparatus for transmitting/receiving a reference signal in a wireless communication system
A method and apparatus for transmitting/receiving reference signals in Long Term Evolution (LTE) and LTE-Advanced (LTE-A) systems includes determining whether a...
US-9,277,170 Apparatus for transceiving point to point moving signal reception high channel using horizontal blanking...
Provided are a method and apparatus for transceiving an asymmetric point-to-point moving signal and securing an uplink channel using a horizontal blanking...
US-9,277,068 Metadata support in a distributed scan system
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on...
US-9,277,017 Techniques for device independent session migration
Techniques for device independent session migration are presented. A secure mechanism is presented for a target device to receive a current authenticated...
US-9,277,009 Method and system for managing data in a communication network
A method for managing a plurality of files in a communication network having a plurality of clients includes a server receiving (502) metadata associated with a...
US-9,276,963 Policy-based secure containers for multiple enterprise applications
Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy...
US-9,276,959 Client-configurable security options for data streams
A configuration request comprising a security option selected for a particular data stream is received. Nodes of a plurality of functional categories, such as a...
US-9,276,946 Blacklisting and whitelisting of security-related events
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable...
US-9,276,922 Border property validation for named data networks
One embodiment provides a system for distributing packets within a trust domain. During operation, the system receives, by an ingress node in the trust domain,...
US-9,276,910 Systems and methods for convenient and secure mobile transactions
Systems and methods for conducting convenient and secure mobile transactions between a payment terminal and a mobile device, e.g., in a fueling environment, are...
US-9,276,909 Integrity protection and/or ciphering for UE registration with a wireless network
Techniques for performing registration with a wireless network using integrity protection and/or ciphering are described. A user equipment (UE) may perform a...
US-9,276,907 Load balancing in a network with session information
Methods and systems for balancing load among firewall security devices (FSDs) are provided. According to one embodiment, session data, including session entries...
US-9,276,772 Method and apparatus for transmitting and receiving data based on secured path bandwidth in network established...
A method and apparatus for transmitting and receiving data. The method and apparatus previously determines a validity of a data transmission path for...
US-9,276,740 Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application...
Methods and systems are provided for supporting efficient and secure "Machine-to-Machine" (M2M) communications using a module, a server, and an application. A...
US-9,276,738 Digital tachograph
A digital tachograph has a security module. A public key, a secure private key, and a signage are stored in the security module. Vehicle-relevant data and the...
US-9,275,528 Point of sale terminal having enhanced security
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly...
US-9,275,503 Method and apparatus for remotely communicating vehicle information to the cloud
The present invention relates generally to the communication of vehicle data, diagnostics and related information with a network remote from the vehicle, and...
US-9,275,348 Identifying participants for collaboration in a threat exchange community
Identifying participants for collaboration in a threat exchange community can include receiving security data from a plurality of participants at a threat...
US-9,275,257 Secure communication architecture
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption...
US-9,275,238 Method and apparatus for data security reading
A method for data security reading includes steps of: receiving a hardware instruction; analyzing said hardware instruction; if said hardware instruction is a...
US-9,275,237 Method and apparatus for privacy and trust enhancing sharing of data for collaborative analytics
One embodiment of the present invention provides a system for privacy-preserving sharing of data for secure collaboration. During operation, the system obtains...
US-9,275,234 Protecting data on a mobile device
A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a "data...
US-9,275,225 Linear address mapping protection
Technologies for securing an electronic device include determining addresses of one or more memory pages, injecting for each memory page a portion of identifier...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.