Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,712,508 One-touch device personalization
Technologies for one-touch device personalization include at least two mobile computing devices configured to communicate with a personalization server. The...
US-9,710,984 Method for the authentication of at least one first unit on at least one second unit
A method for unilaterally or mutually authenticating at least one first unit, especially a mobile device, on at least one second unit, especially a field...
US-9,710,853 System and method for computer implemented collateral management
A data processing system manages collateral risk associated with a trade of a financial instrument includes memory coupled to a processor, the memory containing...
US-9,710,659 Methods and systems for enforcing, by a kernel driver, a usage restriction associated with encrypted data
A method of providing a restricted set of application programming interfaces includes decrypting, by a secure object information reader executing on a computing...
US-9,709,255 Smart home-care security device
A smart home-care security device includes a security device that includes a master control board and installed for home use. The master control board is...
US-9,709,124 Instrumented damper and performance monitoring system comprising such a damper
A damper having an external armature that is symmetric about a longitudinal axis, an internal armature that is arranged partially inside the external armature...
US-9,707,429 Dynamic pendula stool
Disclosed herein is a dynamic pendula stool possessing a foot, a leg secured to the foot, and a seat secured to the top end of the leg. The leg has a telescopic...
US-9,705,910 Testing web applications for security vulnerabilities with metarequests
A method includes instantiating, in response to a request by an executing application, an input data object with one or more uninitialized fields and traversing...
US-9,705,865 Secure information storage and delivery system and method
A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault...
US-9,705,841 Private mobile messaging and data communications apparatus and method of managing organizational messaging
A private mobile data communications apparatus and methods of managing organizational data flow and coordinate a secure messaging infrastructure allow...
US-9,705,759 Data leakage protection in cloud applications
A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon...
US-9,705,676 Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management
A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full...
US-9,705,672 Key management method and system
Disclosed are a key management method and system. A master key is remotely downloaded to avoid the problem that the master key is not issued to a merchant until...
US-9,705,567 Distributed data storage system and method
A system for storing long-term digital data comprises data storage equipment including one or more data storage devices 26 stored in a sealed data storage...
US-9,704,355 Secure point of sale terminal and associated methods
Methods and systems for processing secure information are disclosed. One method includes receiving secure data from a user via an input device. The method also...
US-9,703,965 Secure containers for flexible credential protection in devices
Techniques are provided for protecting encryption key(s) and other protected material on devices, such as mobile devices. A device stores an encrypted container...
US-9,703,947 Relevancy improvement through targeting of information based on data gathered from a networked device...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with...
US-9,703,331 Board fastener for securing a data storage device in an information handling system
A board fastening apparatus includes an anchor and a key connected by a flexible tether. The anchor may include a pedestal and a collar. The pedestal may be...
US-9,702,966 Synthetic underwater visualization system
A synthetic underwater visualization system (SUVS) comprising a real-time graphics software engine, a sophisticated underwater environmental sensor, a...
US-9,701,061 Tendon placement for high-altitude balloons
Aspects of the disclosure relate to manufacturing balloon envelopes for use in high-altitude mesh networks for packet-data communications. As an example, a gore...
US-9,700,087 Illuminated glove assembly
An illuminated glove assembly includes a glove and an illumination data controller. The glove has a body portion, a longitudinal glove axis, a pointer...
US-9,699,604 Telemetric tracking of a portable computing device
A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and...
US-9,699,304 System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the...
US-9,699,162 Personal area network
An entity may store various levels of sensitive and personal data in a secure computing environment. The entity may create permission rules which allow the data...
US-9,697,519 Multi-layer transaction tracking and encryption
Embodiments for tracking multi-layer secured transactions include systems for providing a dedicated secure transaction channel to a user and sending...
US-9,697,380 Electronic data security apparatus
An apparatus for providing security for an integrated circuit (IC) chip is disclosed. The apparatus may include the IC chip, attached to a surface of a printed...
US-9,697,377 On-demand database service system, method and computer program product for conditionally allowing an...
In accordance with embodiments, there are provided mechanisms and methods for conditionally allowing an application of an entity access to data of another...
US-9,697,228 Secure relational file system with version control, deduplication, and error correction
A computer implemented method and a secure relational file system (SRFS) for storing and managing data for backup and restore are provided. The SRFS receives...
US-9,693,235 Methods and devices for securing radio resources for an LTE-U data transmission
A method for securing radio resources for a Long Term Evolution-unlicensed, LTE-U, data transmission is disclosed. The method includes transmitting a plurality...
US-9,692,848 Preemptive loading of protected data for streaming mobile devices
According to some embodiments, a proxy server populates a proxy server cache with first user content and sends the first user content to a secure client...
US-9,692,593 Distributed storage network and method for communicating data across a plurality of parallel wireless data streams
A distributed storage network receives data that is to be transmitted. The data is processed via one or more error-coding dispersed storage functions and sliced...
US-9,691,264 Security system health monitoring
An apparatus and method for determining at least one operational condition of a premises based system including at least one premises device. The apparatus...
US-9,691,012 Dynamic authentication system and methods for use with legacy terminals
In one embodiment, the present invention provides a method and communication device with an emulated mag stripe capability. Information is transmitted in the...
US-9,690,946 Security analysis using relational abstraction of data structures
Analyzing program code can include detecting an instance of a container within the program code using a processor, selecting a model container correlated with...
US-9,690,945 Security analysis using relational abstraction of data structures
Analyzing program code can include detecting an instance of a container within the program code using a processor, selecting a model container correlated with...
US-9,690,943 BIOS secure data management system
A Basic Input/Output System (BIOS) secure data management system includes a BIOS that is configured to perform a boot process. At least one memory system is...
US-9,690,912 System for interactive matrix manipulation control of streamed data
An interactive streaming media and application service provider system can securely stream high resolution, multiple formats of video and data. Different data...
US-9,690,721 System and method of sharing memory by arbitrating through an internal data bus
One or more methods and systems of sharing an external memory between functional modules of an integrated circuit chip are presented. The invention provides a...
US-9,690,717 Secure object having protected region, integrity tree, and unprotected region
A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected...
US-9,688,248 Vehicle security arrangement
A security arrangement for a motor vehicle having a vehicle management system and an on board diagnostics port to permit the external interrogation of the...
US-9,686,787 Pooled transport and control functions in a 3GPP LTE network
Presented are methods and apparatus for decoupling transport and control (T&C) functions from a plurality of eNBs and collecting the T&C functions in a...
US-9,686,685 Method of reinforcing security of beacon device, and system and apparatus thereof
Provided are a method of reinforcing the security of a beacon device and a system and apparatus thereof. In particular, the stability of security is increased...
US-9,686,301 Method and system for virtual asset assisted extrusion and intrusion detection and threat scoring in a cloud...
An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters, including security threat patterns,...
US-9,686,290 Procedure for the preparation and performing of a post issuance process on a secure element
The invention relates to a method for enabling post issuance operation on a secure element connectable to a communication device. The method allows an SE...
US-9,686,241 System and method for using unique device identifiers to enhance security
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can...
US-9,686,240 IPv6 to IPv4 data packet migration in a trusted security zone
Systems and methods discussed herein relate to enabling communications between IPv4 and IPv6 hosts using a communication channel in a trusted security zone...
US-9,686,079 Electronic document notarization
A server receives a package of data including: a document designated for notarization, identification information including a photograph, photograph of a user,...
US-9,680,849 Rootkit detection by using hardware resources to detect inconsistencies in network traffic
A technique allows detection of covert malware that attempts to hide network traffic. By monitoring network traffic both in a secure trusted environment and in...
US-9,680,804 Distributed learning and aging for management of internet protocol (IP) addresses
A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious...
US-9,680,794 Secure one-way interface for archestra data transfer
A system for transmitting ArchestrA information from a first network in a first security domain to a second network in a second security domain. A first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.