Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,781,122 Multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request from a client for an identity management service, authenticates the...
US-9,781,110 Computerized methods for location-based service provision
Computerized methods useful for causing provision of user-specific services via one or more data network apparatus and user mobile device. In one embodiment,...
US-9,781,108 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-9,781,098 Generic server framework for device authentication and management and a generic framework for endpoint command...
Methods, devices, and systems are described for enrolling a user's bring-your-own-device for secure connection to a company's enterprise computer network. From...
US-9,781,080 Method and apparatus for diverse security handling in an enhanced local area network
A method for diverse security handling may comprise: maintaining a first connection between a user equipment and a first network node, and a second connection...
US-9,781,079 Security key generator
A communication system has a first and a second communicating device operable to send and receive data units through a communication channel. Some of the data...
US-9,781,076 Secure communication system
A communications system (40) comprises a first entity (42), a first encryption device (48) and a network (46). The first encryption device (48) is adapted to...
US-9,781,042 Network controller security monitor
Technologies are generally described for systems, devices and methods effective to compare network element instructions and network control instructions. In...
US-9,780,966 Network apparatus for secure remote access and control
A network appliance is designed and configured to communicate over a data network and to provide secure on-demand remote access and control of a computing...
US-9,780,837 Spatially enabled secure communications
Spatially enabled secure communication technologies are disclosed. A proximity boundary can be defined by a communication range of one or more SRC devices...
US-9,780,602 System for the monitoring and maintenance of remote autonomously powered lighting installations
A system of monitoring and/or maintaining remotely located autonomously powered lights, security systems, parking meters, and the like is operable to receive...
US-9,779,823 Secure erase of non-volatile memory
In a non-volatile memory system, a fast bulk secure erase method for erasing data includes, in response to a secure erase command: applying charge to a portion...
US-9,779,641 Self-destructive documents for information security and privacy protection
The inventor here discloses destructive (self-destructing) documents useful for the protection of confidential information. The invention comprises a document...
US-9,779,615 Permitting processing system for a monitoring on demand security system
A premises apparatus is provided. The premises apparatus includes a processor configured to: determine that at least one monitoring service is being requested...
US-9,779,597 Method of operating a security system with deterrent capability for intimidation and neutralization
A method of operating a security system with deterrent capability is implemented through security cameras that are articulated and non-articulated, entry doors,...
US-9,779,393 Secure distributed single action payment authorization system
Methods and systems for enabling and performing secured, single action payments from a mobile device are disclosed. One method includes transmitting user...
US-9,779,270 Secured keypad devices
A data entry device including a housing including a top housing portion including key apertures, a plurality of data entry keys mounted in the housing to have...
US-9,779,264 Method, server and computer program for security management in database
Disclosed is a program for security management in a database, which is stored in a computer readable medium to allow a computer to perform steps including:...
US-9,779,261 Entity security implied by an asset in a repository system
Techniques are described for managing access to a repository system storing information (e.g., metadata) about objects (e.g., an application, a process, or a...
US-9,779,260 Aggregation and classification of secure data
In one embodiment, a method includes managing and controlling a plurality of data-access credentials. The method further includes accessing data from a...
US-9,779,258 Confidential extraction of system internal data
Secure extraction of state information of a computer system is provided. A method includes obtaining, by a security engine of a system, a public encryption key...
US-9,779,255 Split storage and communication of documents
Embodiments for preventing data loss and allowing selective access data include systems and methods that receive a data payload to be stored by the system;...
US-9,779,252 Crowd-sourced security analysis
A cloud-based static analysis security tool that is accessible by a set of application development environments is augmented to provide for anonymous knowledge...
US-9,779,248 Protection of secured boot secrets for operating system reboot
Protecting secured boot secrets while starting an operating system. Embodiments include starting a first operating system using a trusted computing base,...
US-9,779,246 System and method for updating an operating system for a smart card or other secure element
A secure element includes a boot program comprises instructions for the execution a startup step to determine if a non-volatile memory stores an active...
US-9,779,244 Establishing secure initial state in a processing platform containing both high assurance security and...
A method including initializing the processing platform, wherein initializing the processing platform includes performing a power on self-test (POST) configured...
US-9,779,241 Synchronization of UEFI secure boot variables on a managed server
Techniques are provided for actively managing secure boot variables. Such techniques include receiving a request from an entity to modify a portion of a basic...
US-9,779,232 Trusted code generation and verification to prevent fraud from maleficent external devices that capture data
A user equipment. The user equipment comprises a processor, a memory, a trusted security zone, wherein the trusted security zone provides hardware assisted...
US-9,779,225 Method and system to provide access to secure features of a device
A method of providing access to secure features of a device includes detecting motion of a secured device during entry of first access credentials on the...
US-9,779,033 Memory management device and non-transitory computer readable storage medium
In one embodiment, a storage unit stores a table tree and verifier tree. The table tree includes parent and child tables. The verifier tree includes parent and...
US-9,778,868 Data recorder for permanently storing pre-event data
A data recorder for permanently storing pre-event data may include a read-write memory with a plurality of bit cells in the read-write memory. Each bit cell may...
US-9,778,640 System-based control of programmable devices
A requirement exists for machine-to-machine communications between the multiple Smart Devices and Networks (SDNs) a user has without in today's environment of...
US-9,776,730 Independently operable flight data capture and transmission device
An independently operable flight data capture and transmission device includes an aerodynamically efficient main body having a mounting bracket for securing the...
US-9,774,577 Device, system and method providing data security and attribute based data access in participatory sensing
Disclosed are devices, systems, and methods for securing data using attribute based data access. The data may correspond to a sensory environment, and the data...
US-9,774,446 Managing use of security keys
A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply...
US-9,773,121 Security application for data security formatting, tagging and control
A security program installed or in communication with a computer is provided. The security program is configured to intercept disk (I/O) operations that...
US-9,772,845 Method and apparatus to process KECCAK secure hashing algorithm
A processor includes a plurality of registers, an instruction decoder to receive an instruction to process a KECCAK state cube of data representing a KECCAK...
US-9,769,949 Mobile video, audio, and sensory apparatus
A self-contained mobile surveillance apparatus has applicability in a variety of short or long term settings where security and documentation of activities are...
US-9,769,664 Nonce silent and replay resistant encryption and authentication wireless sensor network
An access point and a sensor node are disclosed for use within a wireless sensor network. The wireless sensor network includes at least one access point adapted...
US-9,769,658 Certificating vehicle public key with vehicle attributes
A method for providing secure connection between vehicles. A unique pair of digitally signed public key and private key is provided to each vehicle, along with...
US-9,769,639 Secure emergency response technology
Technology for securely processing emergency response. An emergency response server receives intermittent location data from a client device during...
US-9,769,276 Real-time network monitoring and security
A hardware device for monitoring and intercepting data packetized data traffic at full line rate, is proved. In high bandwidth embodiments, full line rate...
US-9,769,213 Method and system for secure digital object management
A system and method for secure data object management system comprising a cloud-based host environment and a local secure container. The cloud-based host...
US-9,769,170 Synchronizing credential hashes between directory services
The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a...
US-9,769,169 Secure sensor data transport and processing
The present disclosure is directed to secure sensor data transport and processing. End-to-end security may prevent attackers from altering data during the...
US-9,769,149 Proxy-less secure sockets layer (SSL) data inspection
Some embodiments of proxy-less Secure Sockets Layer (SSL) data inspection have been presented. In one embodiment, a secured connection according to a secured...
US-9,769,148 Secure application access system
A proxy server receives a synchronization request from an application program resident on a user device. The proxy server determines that the user device...
US-9,769,144 Method for logging of a remote control session
A method for logging of a remote control session, for use in a remote control system comprising a session initiator operable to initiate a remote control...
US-9,769,137 Extensible mechanism for securing objects using claims
An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more...
US-9,769,131 Fast reconfiguring environment for mobile computing devices
An example method includes receiving an indication of a selection of a first application environment that includes a first virtual environment associated with a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.