Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,546,835 Automatic electronic communication system for tracking firearms
This invention provides a system, method and algorithm for automatic electronic communication between a firearm formed with a location tracking system and a...
US-9,544,775 Security mechanism for mobile users
A wireless communication device for use in a cellular network. The device comprises a radio interface for enabling communication between the device and a base...
US-9,544,766 System and method for authentication and key exchange for a mobile device via spectrally confined wireless...
An architecture, system and associated method and apparatus for securely communicating authentication data to a communication device. In one embodiment, the...
US-9,544,547 Monitoring smart devices on a wireless mesh communication network
A surveillance system and method with at least one wireless input capture device ICD(s) and a corresponding digital input recorder (DIR) and/or another ICD,...
US-9,544,545 Vehicle service system optical target assembly calibration
A machine vision vehicle wheel alignment system for acquiring measurements associated with a vehicle. The system includes at least one imaging sensor having a...
US-9,544,395 Facilitating quality of service and security via functional classification of devices in networks
Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device of...
US-9,544,380 Data analytics and security in social networks
A method for securing a social network account assigned to a member is provided. The method may include determining at least one social network account assigned...
US-9,544,327 Prioritizing security findings in a SAST tool based on historical security analysis
A cloud-based static analysis security tool accessible by a set of application development environments is augmented to provide for anonymous knowledge sharing...
US-9,544,325 Social network security monitoring
A computer-implemented method includes security settings data associated with one or more profiles of a protected social entity on one or more social networks...
US-9,544,318 HTML security gateway
A technique allows a client computing system with a web browser to receive a web page in response to transmitting a request for content. The web page may...
US-9,544,314 Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
US-9,544,308 Compliant authentication based on dynamically-updated credentials
A system, method and a computer-readable medium for authenticating a user in a live manner in non-face-to-face transactions, including a user downloading an...
US-9,544,307 Providing a security mechanism on a mobile device
Disclosed are methods, apparatus, systems, and computer program products for providing a security mechanism on a mobile device before performing an action on a...
US-9,544,304 Auditing and permission provisioning mechanisms in a distributed secure asset-management infrastructure
The embodiments described herein describe technologies for ticketing systems used in consumption and provisioning of data assets, such as a pre-computed (PCD)...
US-9,544,303 System and device for consolidating SIM, personal token, and associated applications for selecting a...
The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification....
US-9,544,301 Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
US-9,544,297 Method for secured data processing
A method for facilitating secured data processing, the method includes generating, for each client out of at least two clients, a private key, and a public key;...
US-9,544,291 System and method for limited records access for event scheduling
The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a...
US-9,544,286 Methods and systems for increasing the security of electronic messages
A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a...
US-9,544,284 Secure data exchange technique
A technique for the secure exchange of data between multiple entities that use compatible business management systems utilizes serializable data transfer...
US-9,544,152 Dual layer transport security configuration
A system includes a first computer processor that receives a data transmission from a second computer processor. The data transmission includes a client...
US-9,544,140 Multi-level key hierarchy for securing cloud-based data sets
A hierarchy is defined that includes encryption keys associated with different first and second levels of the hierarchy, where the second level includes fewer...
US-9,542,783 Method and apparatus for authenticating access to a multi-level secure environment of an electronic device
An electronic system utilizes a method (500) for authenticating access to a multi-level secure environment. According embodiments, the system stores (501)...
US-9,542,691 System and method for securely managing delivery and redemption of location-based incentives and customer...
A plurality of credentials is retrieved for a user by a computing device, wherein each of the plurality of credentials is associated with a loyalty program. For...
US-9,542,683 System and method for protecting electronic money transactions
Disclosed are systems and methods for protecting electronic money transactions from fraud and malware. An exemplary method include scanning a computer to detect...
US-9,542,675 Alert architecture
Systems, architecture of the systems, and methods for generating alert message are disclosed. A user enrolls in an alert messaging service. Information that the...
US-9,542,671 Method and system to facilitate securely processing a payment for an online transaction
A computer-implemented method, to facilitate processing a payment for an online transaction, includes, responsive to receiving secure transaction data from a...
US-9,542,630 Method of securely reading data from a transponder
The invention discloses a method of reading data (dat) from a first transponder (TAG1) into a transceiver (REA). Said (dat) are only transmitted from the first...
US-9,542,561 Instructions processors, methods, and systems to process secure hash algorithms
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a.sub.i,...
US-9,542,560 Methods and systems for providing access control to secured data
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all...
US-9,542,558 Secure factory data generation and restoration
In various embodiments, methods, devices and systems for securely generating, sealing, and restoring factory-generated calibration and provisioning data for an...
US-9,542,541 System and method for distinguishing human swipe input sequence behavior
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
US-9,542,536 Sustained data protection
Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access...
US-9,542,378 System and method for deploying a form template on multiple platforms
The present embodiments are directed to systems and methods of creating and deploying electronic forms for collecting information from a user using a browser or...
US-9,542,337 Device side host integrity validation
Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a...
US-9,542,231 Efficient execution of parallel computer programs
The present invention, known as runspace, relates to the field of computing system management, data processing and data communications, and specifically to...
US-9,542,205 Configuring a data center
Embodiments of the present disclosure disclose a method and an apparatus for configuring a data center. The method comprises obtaining a function call...
US-9,542,177 Peer configuration analysis and enforcement
The states or configurations of peer hosts within a host class may be analyzed and enforced by comparing records of the respective systems' states or...
US-9,542,114 Methods and apparatus to protect memory regions during low-power states
A disclosed example involves managing power states, signing a suspend-to-RAM (STR) data structure by: generating a header key, a scatter/gather table key and a...
US-9,542,113 Apparatuses for securing program code stored in a non-volatile memory
An embodiment of an apparatus for securing program code stored in a non-volatile memory is introduced. A non-volatile memory contains a first region and a...
US-9,542,109 Method for selectively performing a secure data erase to ensure timely erasure
A method and computer program product are provided to ensure a timely secure data erase by determining an erasure deadline for each physical volume of a...
US-9,542,006 Secure KM switch
A system enabling a computer user to securely share a single set of keyboard and mouse (KM) among multiple isolated computers. The system enables one set of...
US-9,539,501 System for implementing internet-based games with a core platform, game modules, and protected game outcome...
An internet gaming system includes a core platform, and a vertical extension functionality configured with the core platform and having a first application...
US-9,537,918 File sharing with client side encryption
Technology is disclosed herein for sharing encrypted data within a client-server distributed data storage system. According to at least one embodiment, a first...
US-9,537,898 Shared security utility appliance for secure application and data processing
A method is disclosed that includes registering an application with a security information technology element (ITE), where the security ITE includes a secure...
US-9,537,895 System and method for securing use of a portable drive with a computer network
Solution for autonomously securing the use of a portable drive with a computer network. A data store is written and maintained that contains entries...
US-9,537,883 Process security validation
Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first...
US-9,537,882 Methods, systems, and devices for detecting and isolating device posing security threat
Methods and systems are disclosed for detecting a security threat. The methods and systems comprise detecting that a first device is coupled with the first I/O...
US-9,537,879 Cyber security monitoring system and method for data center components
A security monitoring system is disclosed which is adapted for use with a component having a service processor. The system may use a device configured to...
US-9,537,863 Data driven role based security
Data driven role based security is provided. At login, the system queries for a data context in connection with access to computing objects of a computing...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.