Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,076,138 Method and apparatus for obfuscating slice names in a dispersed storage system
A method begins by a processing module receiving a data segment for dispersed storage. The method continues with the processing module encoding the data segment...
US-9,076,111 Methods of integrating multiple management domains
An integrated solution strategy that integrates multiple domains together in a seamless and standardized way for increasing a users control over facilities and...
US-9,076,004 Systems and methods for secure hybrid third-party data storage
The disclosed computer-implemented method for secure hybrid third-party data storage may include (1) identifying, at a trusted proxy system, an access request...
US-9,076,003 Method and apparatus for transparently encrypting and decrypting computer interface data
In general, embodiments of the invention include methods and apparatuses for securing otherwise unsecured computer interfaces by performing transparent data...
US-9,076,001 Method and apparatus for implementing a secure content pipeline
Systems, methods, and other embodiments associated with implementing a secure content pipeline are described. According to one embodiment, an apparatus includes...
US-9,075,986 Systems and methods for software application security management
Apparatus and method for managing password information associated with a service account are disclosed. In some embodiments, a service account management system...
US-9,075,978 Secure configuration of mobile applications
Secure configuration of a mobile application ("app") includes sending the required configuration data for the app to the user's mobile computing device in a...
US-9,075,970 Systems and methods for secure handling of secure attention sequences
A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine includes executing, by a desktop appliance, a user...
US-9,075,969 Systems and methods for secure handling of secure attention sequences
A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine includes executing, by a desktop appliance, a user...
US-9,075,960 Digital media content management apparatus and method
A digital media content management apparatus and method for securely storing a content file on a computer readable medium and playing the content file from the...
US-9,075,957 Backing up digital content that is stored in a secured storage device
A third party facilitates preparation of a backup SSD for backing up a source SSD. Digital data of the source SSD, which includes protected and sensitive data...
US-9,075,751 Secure data protection with improved read-only memory locking during system pre-boot
Generally, this disclosure provides methods and systems for secure data protection with improved read-only memory locking during system pre-boot including...
US-9,075,644 Secure recursive virtualization
A mechanism is provided for performing secure recursive virtualization of a computer system. A portion of memory is allocated by a virtual machine monitor (VMM)...
US-9,074,538 Abnormal combustion detection apparatus and control unit of internal combustion engine
An abnormal combustion detection apparatus detects an abnormal combustion of an internal combustion based on a vibration waveform from a vibration sensor...
US-9,072,560 Implant removal aid for use with implants utilizing a data carrier
A storage system for packaging and storing medical devices with associated data carriers, or tags that can be used for tracking inventory levels and uses of an...
US-9,072,186 Harness assembly
An assembly for physically securing, and providing data and power to, a portable electronic consumer product that has opposed sides that each include one or...
US-9,071,971 Adaptive and context based NFC access control filtering
A mobile device includes a transceiver for performing wireless communication; one or more secure elements which execute applications in a secure environment; a...
US-9,071,962 Evolved packet system non access stratum deciphering using real-time LTE monitoring
A monitoring system is coupled to interfaces in an LTE network and passively captures packets from the network interfaces. First data packets associated with an...
US-9,071,661 Data communication coordination with sequence numbers
Described are sequence numbers for client-server communication, to control a client's use of server resources. A server grants the client credits, and the...
US-9,071,646 Method, apparatus and program storage device for providing network perimeter security assessment
A method for providing network perimeter security assessment that involves a combination of perimeter security assessment disciplines is disclosed. A security...
US-9,071,642 System and method for securely transmitting data using video validation
Secure transmission of electronic information is provided between two parties. Included is a first data communication session between a first computing device...
US-9,071,627 Method and system for cloning applications from an electronic source device to an electronic target device
Security is enhanced for a user of electronic devices by providing a method for providing an application to an electronic device. According to an embodiment, an...
US-9,071,585 Copy offload for disparate offload providers
Aspects of the subject matter described herein relate to offload technology. In aspects, a source offload provider may transfer bulk data to a destination...
US-9,071,582 Communication apparatus, reception control method, and transmission control method
Lookaside-type communication apparatus and reception and transmission control methods make high-rate communication of a packet including encrypted data. Receive...
US-9,071,581 Secure storage with SCSI storage devices
A security command protocol provides secure authenticated access to an auxiliary security memory within a SCSI storage device. The auxiliary security memory...
US-9,071,580 Method and system for securing data of a mobile communications device
A method and system for securing data of a mobile communications device. The method includes: determining that first application data is data associated with a...
US-9,071,574 Access and control system for network-enabled devices
Systems and methods for remote access of network-enabled devices that provide seamless, firewall-compliant connectivity between multiple users and multiple...
US-9,071,447 Security system and method
A method for generating data encryption coding with variable clocking according to one embodiment includes storing a secret code in a first register; storing a...
US-9,071,429 Revocable shredding of security credentials
Customers accessing resources and/or data in a multi-tenant environment can obtain assurance that a provider of that environment will honor only requests...
US-9,071,189 Motor drive configuration system and method
A motor drive comprises a power sub-assembly and a control sub-assembly removably secured to the power sub-assembly. The power sub-assembly contains all power...
US-9,070,277 Meter capable of having communication security and data transmitting/receiving system using the same
Disclosed is a meter capable of having communication security and a data transmitting/receiving system using the same, the system being such that a the server...
US-9,070,129 Method and system for securing data fields
A merchant conducting a transaction on an account forms transaction data with a sensitive data field. To obscure the account prior to transmitting information...
US-9,070,007 Adjustable data reader with pivot mount
A data reading system for reading encoded data, such as barcode labels or RFID tags, from an item. The data reading system includes a housing, a data reader...
US-9,069,987 Secure data access using SQL query rewrites
A mechanism is provided for secure data access in a data processing system. A database having two tables is provided. A subset of the tables' primary key...
US-9,069,983 Method and apparatus for protecting sensitive information from disclosure through virtual machines files
A method and apparatus for protecting sensitive information from disclosure through virtual machine files is disclosed. In one embodiment, the method includes...
US-9,069,980 Methods and systems for securing data by providing continuous user-system binding authentication
Devices, methods, and computer programs are presented for managing data security. One example method includes receiving user identification information from a...
US-9,069,972 Secure digital card, and secure digital card system and operating method
A Secure Digital (SD) card, and an system and an operating method for the SD card are disclosed. The disclosed SD card has a Flash memory and a controller. The...
US-9,069,955 File system level data protection during potential security breach
Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file...
US-9,069,953 Method for checking data consistency in a system on chip
The invention aims to provide a method and a system on chip able to detect at once hardware and software errors to prevent manipulations for retrieving...
US-9,069,933 Secure, networked portable storage device
A secure, networked portable storage device includes: a secure data storage section; a program storage section including a security program operatively...
US-9,069,930 Security information and event management system employing security business objects and workflows
A security information and event management (SIEM) system includes a data storage sub-system that stores (1) security data pertaining to security-related events...
US-9,069,782 System and method for security and privacy aware virtual machine checkpointing
A checkpointing method for creating a file representing a restorable state of a virtual machine in a computing system, comprising identifying processes...
US-9,069,766 Content-based isolation for computing device security
The subject disclosure is directed towards securing a computing device using content-based isolation. When the computing device requests content data having...
US-9,069,703 Encrypted-transport solid-state disk controller
An encrypted transport SSD controller has an interface for receiving commands, storage addresses, and exchanging data with a host for storage of the data in a...
US-9,069,637 Dynamic feature enhancement in client server applications and high volume server deployment with dynamic app...
Generally, this disclosure provides methods and systems for dynamic feature enhancement in client server applications and for high volume server deployment with...
US-9,069,626 Trusted client-centric application architecture
A Trusted Client-Centric Application Architecture (TC.sup.2A.sup.2) provides the ability to securely exchange data between applications. TC.sup.2A.sup.2 may be...
US-9,069,533 Data center container with draining mechanism
A data center container includes a chassis, a cooling system, a draining mechanism, and a latching member. The chassis includes a front plate with a securing...
US-9,069,356 Nomadic security device with patrol alerts
There is provided a device such as a robot that includes a processor and a number of sensors. Each of the sensors provides respective sensor data to the...
US-9,067,390 Data carrier card having a security thread
A data carrier card, in particular a chip and/or magnetic strip card, has a card body comprising one or more films and a security thread integrated in the card...
US-9,066,211 Decision support
Decision support information is exchanged over a secure wireless network among mobile computing devices, and also optionally a central command computer. Each of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.