Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,100,186 Secure file sharing method and system
Systems and methods are provided for securely sharing data. A processor forms two or more shares of a data set encrypted with a symmetric key, the data set...
US-9,100,184 Instructions processors, methods, and systems to process BLAKE secure hashing algorithm
A method of an aspect includes receiving an instruction indicating a first source having at least one set of four state matrix data elements, which represent a...
US-9,100,173 Security USB storage medium generation and decryption method, and medium recorded with program for generating...
Disclosed is a security USB storage medium generation and decryption method. The method comprises outputting information for requesting an input of a user...
US-9,100,172 Method for interworking with trustzone between normal domain and secure domain, and management method of...
The present invention provides a trusted application download management, authentication, and execution method and system. A trusted application download...
US-9,100,104 Systems and methods for physical security of information flows over a power cable connection
An aircraft includes a first electrical connector configured to couple with a first power cable, a first data communication network and a first modem coupled to...
US-9,098,721 Method for strongly encrypting .ZIP files
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data...
US-9,098,719 Securing unrusted content for collaborative documents
A method and an apparatus that configure a sandbox document for secure presentation of a block of data stored in the sandbox document in response to an editing...
US-9,098,718 Systems and methods for securing data using multi-factor or keyed dispersal
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,098,717 System for selectively performing a secure data erase to ensure timely erasure
A system is provided to ensure a timely secure data erase by determining an erasure deadline for each physical volume of a plurality of physical volumes and...
US-9,098,713 Clipboard protection system in DRM environment and recording medium in which program for executing method in...
Disclosed are a clipboard protection system in a DRM environment and a recording medium in which a program for executing the method in a computer is recorded....
US-9,098,712 Encrypting operating system
A method of and system for encrypting and decrypting data on a computer system is disclosed. In one embodiment, the system comprises an encrypting operating...
US-9,098,709 Protection of user data in hosted application environments
A method of converting an original application into a cloud-hosted application includes splitting the original application into a plurality of application...
US-9,098,703 SOC with security function and device and scanning method using the same
A system-on-chip (SOC) for semiconductor intellectual property (IP), a device including the same, and a method of operating the same are provided. The SOC...
US-9,098,699 Smart television data sharing to provide security
A technique shares smart television data among subscribing organizations to provide security. The technique involves collecting, by an electronic server...
US-9,098,692 Secure electromagnetic data storage element having a selectively determind switchable security mode
The apparatus of the present invention are directed to a selectively accessible electromagnetically resonant data storage element (implemented as a resonant...
US-9,098,691 Method and apparatus for encoding and decoding data transmitted to an authentication token
Methods and apparatus for encoding and decoding data transmitted acoustically and/or optically to strong authentication tokens to generate dynamic security...
US-9,098,685 Flexible method of user authentication
A method of authorizing a user at a location is disclosed. A user data input device is used for receiving of user information. In dependence upon stored policy...
US-9,098,442 Secure object having protected region, integrity tree, and unprotected region
A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected...
US-9,098,401 Fast secure erasure schemes for non-volatile memory
A method includes, in a memory with multiple analog memory cells, storing one or more data pages in respective groups of the memory cells using a first...
US-9,098,381 Modular arithmatic unit and secure system including the same
A modular arithmetic unit includes a first input generator receiving first data to generate a first operand; a second input generator receiving second data to...
US-9,098,259 Secure digital input/output low-power mode
A low-power mode for interfaces, such as secure digital input/output (SDIO) interfaces, is described. The low-power mode provides significant power savings...
US-9,098,221 Image forming apparatus, control method therefor, and storage medium storing control program therefor
An image forming apparatus that facilitates management of information security policy even for an extended application installed from exterior. A scanning unit...
US-9,097,788 Baggage tracker
A luggage tracking assembly for tracking luggage during air travel and providing location information or other luggage related information to a remote device....
US-9,097,036 Security system and devices for musical instruments and firearms
A security system having a device that attach directly to and locks on or around an object to be secured, or one or more parts of the system are integrated into...
US-9,094,823 Data processing for securing local resources in a mobile device
A method of data processing for securing local resources in a mobile device. The method includes: a) when network connectivity is available: coupling the mobile...
US-9,094,739 Internet protocol switching system and associated method of use
An IP switching system that includes a coder/decoder configured for converting voice between analog and digital; and a first switch coupled to the coder/decoder...
US-9,094,699 System and method for security key transmission with strong pairing to destination client
Systems and methods for security key transmission with strong pairing to a destination client are disclosed. A security key may be generated by an on-chip key...
US-9,094,448 Methods and systems for evaluating software for known vulnerabilities
A vulnerability identification and resolution (VIR) computer device for identifying security vulnerabilities in a computer system is provided. The VIR computer...
US-9,094,435 Systems and methods for prevention of JSON attacks
Described herein is a method and system for prevention of personal computing attacks, such as JavaScript Objection Notation (JSON) attacks. An intermediary...
US-9,094,405 Methods and systems for establishing secure communications
A method for providing a bit string on at least two electronic devices is provided. A sensor input is received by sensors in the electronic devices and recorded...
US-9,094,401 Secure front-end interface
A secure front-end interface for a PLC, RTU or similar device is disclosed. A first server is coupled to the PLC via a communications link and is configured to...
US-9,094,399 Method for establishing secure communication link between computers of virtual private network
A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a...
US-9,094,375 WAN transport of frames with MAC security
A physical layer device provides security processing on communication frames that may include tags or headers that are for use in a wide area network. As frames...
US-9,094,331 Method and apparatus for internet protocol (IP) logical wire security
A method and apparatus for improved approaches for detection of exploits and drift in a network is described. The method includes: determining, by a processor,...
US-9,094,288 Automated discovery, attribution, analysis, and risk assessment of security threats
A method for profiling network traffic of a network. The method includes obtaining a signature library comprising a plurality of signatures each representing...
US-9,094,227 Power management network system
A power management network system includes an advanced metering infrastructure (AMI) to communicate with a power supply source to receive power information and...
US-9,094,211 Systems and methods for identifying an individual
The present application relates to systems and methods using biometric data of an individual for identifying the individual and/or verifying the identity of an...
US-9,094,205 Secure provisioning in an untrusted environment
Embodiments of methods of provisioning an electronic circuit enable security of sensitive data in a design and manufacturing process that includes multiple...
US-9,094,190 Method of managing key for secure storage of data and apparatus therefor
A method and apparatus for managing a key for secure storage of data. The apparatus includes a main controller configured to process a command, a cipher unit...
US-9,094,140 Methods and apparatus for audience research in a content-based network
Methods and apparatus for accurate, secure and uniform exchange of audience research data. In one embodiment, viewership data is provided in real-time and...
US-9,092,962 Diversity networks and methods for secure communications
Security systems may include sensing, networked communications, stealth, alarms, and countermeasures, any or all of which may adapt to threats. These systems...
US-9,092,922 Systems, methods, and programs for voter information initialization and consolidation
Systems, methods, and programs allow for the secure compilation of vote data from electronic voting machines at a voting location. Systems, methods, and...
US-9,092,777 Credit card tokenization techniques
The present invention provides techniques in connection with payment transactions. Techniques are included in which a non-merchant entity generates, stores, and...
US-9,092,770 Apparatus, system and method for stimulating and securing retail transactions
An apparatus, system and method of stimulating a retail transaction. The apparatus, system and method may include obtaining, via an opt-in to an in-store...
US-9,092,766 Payment terminal system and method of use
A payment terminal, including: a display, an input device configured to generate input signals indicative of a user input, a payment instrument reader...
US-9,092,643 Secure access to personal health records in emergency situations
A system including a server system, a user terminal and a hardware token, for providing secure access to a data record. The server system comprises storage...
US-9,092,636 Methods and systems for exact data match filtering
A technique for efficiently preventing exact data words ("entities") from unauthorized disclosure is disclosed. Protect agents installed at various egress...
US-9,092,622 Random timeslot controller for enabling built-in self test module
A data processing system having a first processor, a second processor, a local memory of the second processor, and a built-in self-test (BIST) controller of the...
US-9,092,621 Method of detecting fault attack
In a method of detecting a fault attack in a secure memory device, payload data is initialized by determining whether the payload data is consistent. The...
US-9,092,619 Data processing apparatus
A data processing apparatus is provided, which detects falsification of software to data and rewriting of the data. The data processing apparatus according to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.